From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Invalid Curve Attacks in a GLS Setting., и . IWSEC, том 9241 из Lecture Notes in Computer Science, стр. 41-55. Springer, (2015)A new approach to the discrete logarithm problem with auxiliary inputs., и . LMS J. Comput. Math., 19 (1): 1-15 (2016)Asymptotically Faster Multi-Key Homomorphic Encryption from Homomorphic Gadget Decomposition., , , , и . CCS, стр. 726-740. ACM, (2023)Frequency-domain analysis of discrete wavelet transform coefficients and their adaptive shrinkage for anti-aliasing., , , , , , , и . ICIP, стр. 1071-1074. IEEE, (2013)The Technical Program of IEEE GCCE 2013 Conference Reports., , , и . IEEE Consumer Electronics Magazine, 3 (1): 50-51 (2014)A New Trapdoor over Module-NTRU Lattice and its Application to ID-based Encryption., , , и . IACR Cryptology ePrint Archive, (2019)Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree., и . IACR Cryptology ePrint Archive, (2016)Slice more? It leaks: Analysis on the paper Ön the Feasibility of Sliced Garbling".. IACR Cryptol. ePrint Arch., (2024)Accelerating the Final Exponentiation in the Computation of the Tate Pairings., , и . IACR Cryptology ePrint Archive, (2012)Lens distortion correction and enhancement based on local self-similarity for high-quality consumer imaging systems., , , , и . IEEE Trans. Consumer Electronics, 60 (1): 18-22 (2014)