Author of the publication

Lizard: Cut Off the Tail! A Practical Post-quantum Public-Key Encryption from LWE and LWR.

, , , and . SCN, volume 11035 of Lecture Notes in Computer Science, page 160-177. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved batch verification of signatures using generalized sparse exponents., and . Comput. Stand. Interfaces, (2015)A New Trapdoor over Module-NTRU Lattice and its Application to ID-based Encryption., , , and . IACR Cryptology ePrint Archive, (2019)Instant Privacy-Preserving Biometric Authentication for Hamming Distance., , , , , and . IACR Cryptology ePrint Archive, (2018)Revisiting the Hybrid Attack on Sparse Secret LWE and Application to HE Parameters., and . WAHC@CCS, page 11-20. ACM, (2019)A New Additive Homomorphic Encryption based on the co-ACD Problem., , and . ACM Conference on Computer and Communications Security, page 287-298. ACM, (2014)Efficient verifiable computation over quotient polynomial rings., , and . Int. J. Inf. Sec., 21 (5): 953-971 (2022)Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data., , and . IEEE Trans. Inf. Forensics Secur., 11 (1): 188-199 (2016)Adventures in Crypto Dark Matter: Attacks, Fixes and Analysis for Weak Pseudorandom Function Candidates., , , and . IACR Cryptol. ePrint Arch., (2020)Limits of Polynomial Packings for ℤpk and 픽pk., and . IACR Cryptol. ePrint Arch., (2021)Privacy-preserving Approximate GWAS computation based on Homomorphic Encryption., , , , , and . IACR Cryptol. ePrint Arch., (2019)