Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptosystems with a multi prime composite modulus., and . CCNC, page 1-7. IEEE, (2018)Fast modular squaring with AVX512IFMA., and . IACR Cryptology ePrint Archive, (2018)A toolbox for software optimization of QC-MDPC code-based cryptosystems., and . IACR Cryptology ePrint Archive, (2017)NTT software optimization using an extended Harvey butterfly., , and . IACR Cryptol. ePrint Arch., (2021)Privacy-Preserving Federated Learning over Vertically and Horizontally Partitioned Data for Financial Anomaly Detection., , , , , , , , , and 5 other author(s). CoRR, (2023)Fast multiplication of binary polynomials with the forthcoming vectorized VPCLMULQDQ instruction., , and . ARITH, page 115-119. IEEE, (2018)HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data., , , , , , , , , and 2 other author(s). Proc. Priv. Enhancing Technol., 2023 (1): 325-342 (January 2023)On the Applicability of the Fujisaki-Okamoto Transformation to the BIKE KEM., , , and . IACR Cryptol. ePrint Arch., (2020)BLEACH: Cleaning Errors in Discrete Computations over CKKS., , , and . IACR Cryptol. ePrint Arch., (2022)Converting Transformers to Polynomial Form for Secure Inference Over Homomorphic Encryption., , , , , and . CoRR, (2023)