Author of the publication

Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree.

, and . Public Key Cryptography (1), volume 10174 of Lecture Notes in Computer Science, page 388-408. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Reusable Fuzzy Extractor with Practical Storage Size., , , and . IACR Cryptology ePrint Archive, (2018)Privacy-Preserving Computations of Predictive Medical Models with Minimax Approximation and Non-Adjacent Form., , , and . Financial Cryptography Workshops, volume 10323 of Lecture Notes in Computer Science, page 53-74. Springer, (2017)Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree., and . Public Key Cryptography (1), volume 10174 of Lecture Notes in Computer Science, page 388-408. Springer, (2017)An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero., , and . LMS J. Comput. Math., 19 (A): 255-266 (2016)Cryptoanalysis on 'A round-optimal lattice-based blind signature scheme for cloud services'., , and . Future Gener. Comput. Syst., (2019)Efficient Privacy Preserving Logistic Regression Inference and Training., , , and . IACR Cryptol. ePrint Arch., (2020)PSI with computation or Circuit-PSI for Unbalanced Sets from Homomorphic Encryption., and . AsiaCCS, page 342-356. ACM, (2023)Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree., and . IACR Cryptology ePrint Archive, (2016)A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction., , , and . ACISP, volume 10946 of Lecture Notes in Computer Science, page 28-44. Springer, (2018)How to Securely Collaborate on Data: Decentralized Threshold HE and Secure Key Update., , , , , and . IEEE Access, (2020)