Author of the publication

Implementing Conjunction Obfuscation Under Entropic Ring LWE.

, , , , , , , and . IEEE Symposium on Security and Privacy, page 354-371. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying Pairs of Terms with Strong Semantic Connections in a Textbook Index., , and . KEOD, page 307-315. SciTePress, (2015)978-989-758-158-8.TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation., , , , , , , , , and 14 other author(s). IACR Cryptol. ePrint Arch., (2023)Implementing Conjunction Obfuscation under Entropic Ring LWE., , , , , , , and . IACR Cryptology ePrint Archive, (2017)Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies., , , , and . IACR Cryptology ePrint Archive, (2019)Approximate Homomorphic Encryption with Reduced Approximation Error., , and . CT-RSA, volume 13161 of Lecture Notes in Computer Science, page 120-144. Springer, (2022)Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors., , , , and . WAHC@CCS, page 61-71. ACM, (2018)Intrusion-Resilient Classifier Approximation: From Wildcard Matching to Range Membership., , , , and . TrustCom/BigDataSE, page 1885-1890. IEEE, (2018)Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors., , , , and . IACR Cryptology ePrint Archive, (2017)An end-to-end security architecture to collect, process and share wearable medical device data., and . HealthCom, page 615-620. IEEE, (2015)Secure large-scale genome-wide association studies using homomorphic encryption., , , and . IACR Cryptol. ePrint Arch., (2020)