Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lizard: Cut off the Tail! // Practical Post-Quantum Public-Key Encryption from LWE and LWR., , , and . IACR Cryptology ePrint Archive, (2016)An Efficient Affine Equivalence Algorithm for Multiple S-Boxes and a Structured Affine Layer., , , and . SAC, volume 10532 of Lecture Notes in Computer Science, page 299-316. Springer, (2016)Nodal Flow Simulations by the Immersed Boundary Method., , and . SIAM J. Appl. Math., 74 (2): 263-283 (2014)Efficient Continuous Key Agreement With Reduced Bandwidth From a Decomposable KEM., , and . IEEE Access, (2023)Hybrid Framework for Approximate Computation over Encrypted Data., , , , , , and . IACR Cryptol. ePrint Arch., (2020)Single-Trace Attack on NIST Round 3 Candidate Dilithium Using Machine Learning-Based Profiling., , , , , , , and . IEEE Access, (2021)Error probability for bandlimited hybrid SFH/DS-CDMA., , and . PIMRC, page 83-87. (1996)RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices., , , , and . IEEE Access, (2019)AIM: Symmetric Primitive for Shorter Signatures with Stronger Security., , , , , , , , , and 1 other author(s). CCS, page 401-415. ACM, (2023)Privacy-Preserving Fair Learning of Support Vector Machine with Homomorphic Encryption., , and . WWW, page 3572-3583. ACM, (2022)