From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Lower Bounds for Collusion-Secure Fingerprinting, , , , и . (2003)Challenges for Ring-LWE., и . IACR Cryptol. ePrint Arch., (2016)Lossy Trapdoor Functions and Their Applications., и . SIAM J. Comput., 40 (6): 1803-1844 (2011)Public-key cryptosystems from the worst-case shortest vector problem: extended abstract.. STOC, стр. 333-342. ACM, (2009)Privately Constraining and Programming PRFs, the LWE Way., и . IACR Cryptology ePrint Archive, (2017)Lossy trapdoor functions and their applications., и . STOC, стр. 187-196. ACM, (2008)Heuristics and Rigor in Lattice-Based Cryptography - (Invited Talk).. SCN, том 6280 из Lecture Notes in Computer Science, стр. 54. Springer, (2010)Recovering Short Generators of Principal Ideals in Cyclotomic Rings., , , и . EUROCRYPT (2), том 9666 из Lecture Notes in Computer Science, стр. 559-585. Springer, (2016)Some Recent Progress in Lattice-Based Cryptography.. TCC, том 5444 из Lecture Notes in Computer Science, стр. 72. Springer, (2009)Pseudorandomness of ring-LWE for any ring and modulus., , и . STOC, стр. 461-473. ACM, (2017)