Author of the publication

Solving Closest Vector Instances Using an Approximate Shortest Independent Vectors Oracle.

, , and . J. Comput. Sci. Technol., 30 (6): 1370-1377 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things., , , , , , and . IEEE Internet Things J., 7 (8): 6868-6881 (2020)Practical and Secure Outsourcing Algorithms for Solving Quadratic Congruences in Internet of Things., , , , , and . IEEE Internet Things J., 7 (4): 2968-2981 (2020)An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability., , , , and . J. Cloud Comput., (2022)Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method., , , , and . IEEE Access, (2019)Privacy-Enhanced and Verifiable Compressed Sensing Reconstruction for Medical Image Processing on the Cloud., , , and . IEEE Access, (2022)An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time., , , , and . IEEE Access, (2021)Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks., , , , and . J. Netw. Comput. Appl., (2016)GMetaNet: Multi-scale ghost convolutional neural network with auxiliary MetaFormer decoding path for brain tumor segmentation., , , , , , , and . Biomed. Signal Process. Control., (May 2023)Privacy-Preserving and verifiable SRC-based face recognition with cloud/edge server assistance., , , , , and . Comput. Secur., (2022)Solving closest vector instances using an approximate shortest independent vectors oracle., , and . IACR Cryptology ePrint Archive, (2014)