Author of the publication

Implementing Conjunction Obfuscation Under Entropic Ring LWE.

, , , , , , , and . IEEE Symposium on Security and Privacy, page 354-371. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalable, Practical VoIP Teleconferencing With End-to-End Homomorphic Encryption., , and . IEEE Trans. Inf. Forensics Secur., 12 (5): 1031-1041 (2017)Practical implementations of program obfuscators for point functions., , , , , and . HPCS, page 460-467. IEEE, (2016)An FPGA co-processor implementation of Homomorphic Encryption., , , and . HPEC, page 1-6. IEEE, (2014)Designing an FPGA-Accelerated Homomorphic Encryption Co-Processor., , and . IEEE Trans. Emerg. Top. Comput., 5 (2): 193-206 (2017)Securing Classifiers Against Both White-Box and Black-Box Attacks using Encrypted-Input Obfuscation., , , , , and . CCSW, page 167. ACM, (2020)RPU: The Ring Processing Unit., , , , , , , , , and 7 other author(s). ISPASS, page 272-282. IEEE, (2023)Practical Implementation of Lattice-Based Program Obfuscators for Point Functions., , , , and . HPCS, page 761-768. IEEE, (2017)Encrypted-Input Obfuscation of Image Classifiers., , , , , and . DBSec, volume 12840 of Lecture Notes in Computer Science, page 136-156. Springer, (2021)Implementing Conjunction Obfuscation Under Entropic Ring LWE., , , , , , , and . IEEE Symposium on Security and Privacy, page 354-371. IEEE Computer Society, (2018)A Scalable Implementation of Fully Homomorphic Encryption Built on NTRU., and . Financial Cryptography Workshops, volume 8438 of Lecture Notes in Computer Science, page 221-234. Springer, (2014)