Author of the publication

Additively Homomorphic Encryption with d-Operand Multiplications.

, , and . CRYPTO, volume 6223 of Lecture Notes in Computer Science, page 138-154. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Quadratic Double Circulant Codes over Fields.. Electron. Notes Discret. Math., (2001)On the Hardness of the Decoding and the Minimum Distance Problems for Rank Codes., and . IEEE Trans. Inf. Theory, 62 (12): 7245-7252 (2016)On the non Z4-linearity of certain good binary codes., and . IEEE Trans. Inf. Theory, 45 (5): 1674-1677 (1999)s-extremal additive F4 codes., , , and . Adv. in Math. of Comm., 1 (1): 111-130 (2007)Extended Low Rank Parity Check Codes and Their Efficient Decoding for Multisource Wireless Sensor Networks., , , , and . UNet, volume 12293 of Lecture Notes in Computer Science, page 41-55. Springer, (2019)Efficient image tampering localization using semi-fragile watermarking and error control codes., , , , and . Signal Process., (2022)Distinguisher-Based Attacks on Public-Key Cryptosystems Using Reed-Solomon Codes., , , , and . CoRR, (2013)Classification of extremal and $s$-extremal binary self-dual codes of length 38, , , , and . CoRR, (2011)Weight enumerators of duadic and quadratic residue codes., , and . ISIT, page 485. IEEE, (2004)Construction of Extremal Type II Codes over Z., and . Des. Codes Cryptogr., 16 (3): 257-269 (1999)