Author of the publication

Demonstration of Spider-Eyes-Like Intelligent Antennas for Dynamically Perceiving Incoming Waves.

, , , , , , , , , , , and . Adv. Intell. Syst., 3 (9): 2100066 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rounding in the Rings., and . CRYPTO (2), volume 12171 of Lecture Notes in Computer Science, page 296-326. Springer, (2020)Ring/Module Learning with Errors under Linear Leakage - Hardness and Applications., , and . IACR Cryptol. ePrint Arch., (2023)Functional Encryption Against Probabilistic Queries: Definition, Construction and Applications., , , and . Public Key Cryptography (2), volume 13941 of Lecture Notes in Computer Science, page 429-458. Springer, (2023)Compact Inner Product Encryption from LWE., , and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 141-153. Springer, (2017)Lattice-based Commit-Transferrable Signatures and Applications to Anonymous Credentials., , , and . IACR Cryptol. ePrint Arch., (2023)Ring/Module Learning with Errors Under Linear Leakage - Hardness and Applications., , and . Public Key Cryptography (2), volume 14602 of Lecture Notes in Computer Science, page 275-304. Springer, (2024)FE for Inner Products and Its Application to Decentralized ABE., , and . Public Key Cryptography (2), volume 11443 of Lecture Notes in Computer Science, page 97-127. Springer, (2019)Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More., , and . Public Key Cryptography (1), volume 12110 of Lecture Notes in Computer Science, page 652-681. Springer, (2020)Leakage-Resilient IBE/ ABE with Optimal Leakage Rates from Lattices., , and . Public Key Cryptography (2), volume 13178 of Lecture Notes in Computer Science, page 225-255. Springer, (2022)Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor Against Correlated-Source Attacks., , and . Public Key Cryptography (1), volume 12710 of Lecture Notes in Computer Science, page 421-450. Springer, (2021)