Author of the publication

Privacy-preserving Approximate GWAS computation based on Homomorphic Encryption.

, , , , , and . IACR Cryptol. ePrint Arch., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analytic Toolbox for White-Box Implementations: Limitation and Perspectives., , and . IACR Cryptology ePrint Archive, (2014)Compress Multiple Ciphertexts Using ElGamal Encryption Schemes., , and . IACR Cryptology ePrint Archive, (2012)Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption., , , and . IACR Cryptology ePrint Archive, (2005)A New ID-based Signature with Batch Verification., , and . IACR Cryptology ePrint Archive, (2004)Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations., and . IACR Cryptology ePrint Archive, (2005)Broadcast Encryption π., , , and . IACR Cryptology ePrint Archive, (2005)Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts., and . IACR Cryptology ePrint Archive, (2011)Resistance of S-Boxes against Algebraic Attacks., and . FSE, volume 3017 of Lecture Notes in Computer Science, page 83-94. Springer, (2004)S-boxes with Controllable Nonlinearity., , and . EUROCRYPT, volume 1592 of Lecture Notes in Computer Science, page 286-294. Springer, (1999)Lizard: Cut Off the Tail! A Practical Post-quantum Public-Key Encryption from LWE and LWR., , , and . SCN, volume 11035 of Lecture Notes in Computer Science, page 160-177. Springer, (2018)