Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Variations of the McEliece Cryptosystem., , , , , and . CoRR, (2016)Crypto-Nets: Neural Networks over Encrypted Data., , , , , and . CoRR, (2014)An Anonymous Health Care System., and . IACR Cryptology ePrint Archive, (2011)Ring-LWE Cryptography for the Number Theorist., , , and . IACR Cryptology ePrint Archive, (2015)Constructing elliptic curves with a given number of points over a finite field., , and . IACR Cryptology ePrint Archive, (2001)Affine Pairings on ARM., , , and . IACR Cryptology ePrint Archive, (2011)Attacks on Search RLWE., , and . IACR Cryptology ePrint Archive, (2015)Improved Weil and Tate Pairings for Elliptic and Hyperelliptic Curves., , and . ANTS, volume 3076 of Lecture Notes in Computer Science, page 169-183. Springer, (2004)Manual for Using Homomorphic Encryption for Bioinformatics., , , , , and . Proc. IEEE, 105 (3): 552-567 (2017)Igusa Class Polynomials, Embedding of Quartic CM Fields, and Arithmetic Intersection Theory., , , , , and . WIN - Women in Numbers, volume 60 of Fields Institute Communications, American Mathematical Society, (2011)