Author of the publication

DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity.

, , , , , and . IACR Cryptol. ePrint Arch., (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel - (Short Paper)., , , and . TRUST, volume 6740 of Lecture Notes in Computer Science, page 294-301. Springer, (2011)How to Break Gifford's Cipher., and . Cryptologia, 21 (3): 237-286 (1997)UDM: Private user discovery with minimal information disclosure., , , and . Cryptologia, 46 (4): 347-379 (2022)BVOT: Self-Tallying Boardroom Voting with Oblivious Transfer., and . IACR Cryptol. ePrint Arch., (2020)A Note on Bennett's Time-Space Tradeoff for Reversible Computation., and . SIAM J. Comput., 19 (4): 673-677 (1990)Statistical Techniques for Language Recognition: an Empirical Study Using Real and Simulated English., and . Cryptologia, 18 (4): 289-331 (1994)How we Solved the $100, 000 Decipher Puzzle (16 Hours too late)., and . Cryptologia, 14 (3): 258-284 (1990)Identifying Core Concepts of Cybersecurity: Results of Two Delphi Processes., , , , , , and . IEEE Trans. Educ., 61 (1): 11-20 (2018)Psychometric Evaluation of the Cybersecurity Concept Inventory., , , , , , , and . ACM Trans. Comput. Educ., 22 (1): 6:1-6:18 (2022)Scantegrity: End-to-End Voter-Verifiable Optical-Scan Voting., , , , , , and . IEEE Secur. Priv., 6 (3): 40-46 (2008)