Author of the publication

Fast and Secure Linear Regression and Biometric Authentication with Security Update.

, , , and . IACR Cryptology ePrint Archive, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A faster method for computing Gama-Nguyen-Regev's extreme pruning coefficients.. CoRR, (2014)Fast and Secure Linear Regression and Biometric Authentication with Security Update., , , and . IACR Cryptology ePrint Archive, (2015)The Present and Future of Discrete Logarithm Problems on Noisy Quantum Computers., , , , , , and . CoRR, (2021)A Generic yet Efficient Method for Secure Inner Product., , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 217-232. Springer, (2017)Privacy-Preserving Deep Learning: Revisited and Enhanced., , , , and . ATIS, volume 719 of Communications in Computer and Information Science, page 100-110. Springer, (2017)Enhanced Secure Comparison Schemes Using Homomorphic Encryption., , , , and . NBiS, volume 1264 of Advances in Intelligent Systems and Computing, page 211-224. Springer, (2020)Efficient Key-Rotatable and Security-Updatable Homomorphic Encryption., , , and . SCC@AsiaCCS, page 35-42. ACM, (2017)Hardness Estimation of LWE via Band Pruning., , and . IACR Cryptology ePrint Archive, (2015)Lower Bounds on Lattice Enumeration with Extreme Pruning., , , and . CRYPTO (2), volume 10992 of Lecture Notes in Computer Science, page 608-637. Springer, (2018)Key-Private Proxy Re-encryption under LWE., , , and . INDOCRYPT, volume 8250 of Lecture Notes in Computer Science, page 1-18. Springer, (2013)