Author of the publication

Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme.

, , , , , , and . IEEE Trans. Inf. Forensics Secur., 13 (5): 1169-1184 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing Conjunction Obfuscation under Entropic Ring LWE., , , , , , , and . IACR Cryptology ePrint Archive, (2017)Identifying Pairs of Terms with Strong Semantic Connections in a Textbook Index., , and . KEOD, page 307-315. SciTePress, (2015)978-989-758-158-8.TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation., , , , , , , , , and 14 other author(s). IACR Cryptol. ePrint Arch., (2023)Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies., , , , and . IACR Cryptology ePrint Archive, (2019)Intrusion-Resilient Classifier Approximation: From Wildcard Matching to Range Membership., , , , and . TrustCom/BigDataSE, page 1885-1890. IEEE, (2018)Approximate Homomorphic Encryption with Reduced Approximation Error., , and . CT-RSA, volume 13161 of Lecture Notes in Computer Science, page 120-144. Springer, (2022)Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors., , , , and . WAHC@CCS, page 61-71. ACM, (2018)Bootstrapping in FHEW-like Cryptosystems., and . IACR Cryptology ePrint Archive, (2020)Implementing Token-Based Obfuscation under (Ring) LWE., , , , and . IACR Cryptology ePrint Archive, (2018)Secure large-scale genome-wide association studies using homomorphic encryption., , , and . IACR Cryptol. ePrint Arch., (2020)