Author of the publication

Security Evaluation on KpqC Round 1 Lattice-Based Algorithms Using Lattice Estimator.

, , , , and . ICISC (2), volume 14562 of Lecture Notes in Computer Science, page 261-281. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Error probability for bandlimited hybrid SFH/DS-CDMA., , and . PIMRC, page 83-87. (1996)RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices., , , , and . IEEE Access, (2019)Hybrid Framework for Approximate Computation over Encrypted Data., , , , , , and . IACR Cryptol. ePrint Arch., (2020)Single-Trace Attack on NIST Round 3 Candidate Dilithium Using Machine Learning-Based Profiling., , , , , , , and . IEEE Access, (2021)AIM: Symmetric Primitive for Shorter Signatures with Stronger Security., , , , , , , , , and 1 other author(s). CCS, page 401-415. ACM, (2023)Transciphering Framework for Approximate Homomorphic Encryption., , , , , , , and . ASIACRYPT (3), volume 13092 of Lecture Notes in Computer Science, page 640-669. Springer, (2021)Privacy-Preserving Fair Learning of Support Vector Machine with Homomorphic Encryption., , and . WWW, page 3572-3583. ACM, (2022)Direct Energy Trading of Microgrids in Distribution Energy Market., , , and . SmartGridComm, page 1-6. IEEE, (2019)Lizard: Cut off the Tail! // Practical Post-Quantum Public-Key Encryption from LWE and LWR., , , and . IACR Cryptology ePrint Archive, (2016)Nodal Flow Simulations by the Immersed Boundary Method., , and . SIAM J. Appl. Math., 74 (2): 263-283 (2014)