Author of the publication

Security-preserving Support Vector Machine with Fully Homomorphic Encryption.

, , , , , and . SafeAI@AAAI, volume 2301 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revisiting the Hybrid Attack on Sparse Secret LWE and Application to HE Parameters., and . WAHC@CCS, page 11-20. ACM, (2019)A New Additive Homomorphic Encryption based on the co-ACD Problem., , and . ACM Conference on Computer and Communications Security, page 287-298. ACM, (2014)Resistance of S-Boxes against Algebraic Attacks., and . FSE, volume 3017 of Lecture Notes in Computer Science, page 83-94. Springer, (2004)S-boxes with Controllable Nonlinearity., , and . EUROCRYPT, volume 1592 of Lecture Notes in Computer Science, page 286-294. Springer, (1999)Fast Batch Verification of Multiple Signatures., and . Public Key Cryptography, volume 4450 of Lecture Notes in Computer Science, page 442-457. Springer, (2007)An Identity-Based Signature from Gap Diffie-Hellman Groups., and . Public Key Cryptography, volume 2567 of Lecture Notes in Computer Science, page 18-30. Springer, (2003)A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents., and . Public Key Cryptography, volume 4939 of Lecture Notes in Computer Science, page 328-343. Springer, (2008)Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations., and . IACR Cryptology ePrint Archive, (2005)Broadcast Encryption π., , , and . IACR Cryptology ePrint Archive, (2005)Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts., and . IACR Cryptology ePrint Archive, (2011)