Author of the publication

Blind Web Search: How far are we from a privacy preserving search engine?

, , , , and . IACR Cryptology ePrint Archive, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme., , , , , , and . IACR Cryptology ePrint Archive, (2017)On-the-fly Homomorphic Batching/Unbatching., , and . IACR Cryptology ePrint Archive, (2015)An Investigation of Complex Operations with Word-Size Homomorphic Encryption., , , and . IACR Cryptology ePrint Archive, (2015)Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme., , , , , , and . IEEE Trans. Inf. Forensics Secur., 13 (5): 1169-1184 (2018)Accelerating Fully Homomorphic Encryption in Hardware., , and . IEEE Trans. Computers, 64 (6): 1509-1521 (2015)Accelerating NTRU based homomorphic encryption using GPUs., , and . HPEC, page 1-6. IEEE, (2014)Accelerating Somewhat Homomorphic Evaluation using FPGAs., , , and . IACR Cryptology ePrint Archive, (2015)Constructing Cluster of Simple FPGA Boards for Cryptologic Computations., and . ARC, volume 7199 of Lecture Notes in Computer Science, page 320-328. Springer, (2012)Accelerating LTV Based Homomorphic Encryption in Reconfigurable Hardware., , , and . CHES, volume 9293 of Lecture Notes in Computer Science, page 185-204. Springer, (2015)Evaluating the Hardware Performance of a Million-Bit Multiplier., , and . DSD, page 955-962. IEEE Computer Society, (2013)