Author of the publication

BESTIE: Broadcast Encryption Scheme for Tiny IoT Equipments.

, , and . IACR Cryptology ePrint Archive, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Dynamic Load Balancing for Association Rule Mining., , , and . PDPTA, page 886-894. CSREA Press, (2002)Efficient Verifiable Image Redacting based on zk-SNARKs., , , , and . IACR Cryptol. ePrint Arch., (2020)Efficient Transparent Polynomial Commitments for zk-SNARKs., , , , , and . ESORICS (3), volume 14346 of Lecture Notes in Computer Science, page 348-366. Springer, (2023)Finding association rules of cis-regulatory elements involved in alternative splicing., , and . ACM Southeast Regional Conference, page 232-237. ACM, (2007)ZOS: Zero Overhead Scan for Systolic Array-based AI accelerator., , , and . ISOCC, page 360-361. IEEE, (2022)Competition between group interactions and nonlinearity in voter dynamics on hypergraphs., , , , , and . CoRR, (2024)Compress Multiple Ciphertexts Using ElGamal Encryption Schemes., , and . IACR Cryptology ePrint Archive, (2012)CORE: Co-planarity Regularized Monocular Geometry Estimation with Weak Supervision., , , , , , , , and . ICCV, page 8762-8771. IEEE, (2023)Test Compression Improvement with EDT Channel Sharing in SoC Designs., , , , , , , and . NATW, page 22-31. IEEE, (2014)Privacy-preserving web search., and . ICUFN, page 480-481. IEEE, (2012)