Author of the publication

Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather Than the Statistical Distance.

, , , , and . ASIACRYPT (1), volume 9452 of Lecture Notes in Computer Science, page 3-24. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New constructions of anonymous membership broadcasting schemes., , , and . Adv. in Math. of Comm., 1 (1): 29-44 (2007)Comments on "Physical-layer cryptography through massive MIMO"., and . CoRR, (2020)Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes., , and . IEEE Trans. Inf. Theory, 53 (7): 2542-2559 (2007)Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation., , , , and . AsiaCCS, page 122-133. ACM, (2019)Lattice-based threshold-changeability for standard CRT secret-sharing schemes., , and . Finite Fields Their Appl., 12 (4): 653-680 (2006)Lattice-based zero-knowledge arguments for additive and multiplicative relations., , , and . Des. Codes Cryptogr., 89 (5): 925-963 (2021)A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions., , , , , , , , , and 2 other author(s). ACM Comput. Surv., 55 (12): 251:1-251:32 (December 2023)A subexponential construction of graph coloring for multiparty computation., , , and . J. Math. Cryptol., 8 (4): 363-403 (2014)Security Evaluation of Rakaposhi Stream Cipher., , , and . ISPEC, volume 7863 of Lecture Notes in Computer Science, page 361-371. Springer, (2013)Lattice-based completely non-malleable public-key encryption in the standard model., , and . Des. Codes Cryptogr., 71 (2): 293-313 (2014)