Author of the publication

Linear Depth Integer-Wise Homomorphic Division.

, , , and . WISTP, volume 11469 of Lecture Notes in Computer Science, page 91-106. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of three matrix-based key establishment protocols., , and . IACR Cryptology ePrint Archive, (2011)Algebraic Precomputations in Differential and Integral Cryptanalysis., , , , and . Inscrypt, volume 6584 of Lecture Notes in Computer Science, page 387-403. Springer, (2010)An Analysis of the Hermes8 Stream Ciphers., , , and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 1-10. Springer, (2007)On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes., and . J. Cryptol., 28 (4): 769-795 (2015)Recent developments in cryptographic hash functions: Security implications and future directions.. Inf. Secur. Tech. Rep., 11 (2): 100-107 (2006)FASTA â€" a stream cipher for fast FHE evaluation., , and . IACR Cryptol. ePrint Arch., (2021)Memory Access Pattern Protection for Resource-Constrained Devices., , , and . CARDIS, volume 7771 of Lecture Notes in Computer Science, page 188-202. Springer, (2012)An Analysis of the XSL Algorithm., and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 333-352. Springer, (2005)Publicly Verifiable Outsourced Computation with a Key Distribution Centre., , , and . CoRR, (2014)On the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gröbner Basis Algorithms., , , and . IACR Cryptology ePrint Archive, (2011)