Author of the publication

A Generic yet Efficient Method for Secure Inner Product.

, , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 217-232. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardness Estimation of LWE via Band Pruning., , and . IACR Cryptology ePrint Archive, (2015)Key-Private Proxy Re-encryption under LWE., , , and . INDOCRYPT, volume 8250 of Lecture Notes in Computer Science, page 1-18. Springer, (2013)A New Secure Matrix Multiplication from Ring-LWE., , and . CANS, volume 11261 of Lecture Notes in Computer Science, page 93-111. Springer, (2017)Lower Bounds on Lattice Enumeration with Extreme Pruning., , , and . CRYPTO (2), volume 10992 of Lecture Notes in Computer Science, page 608-637. Springer, (2018)Efficient Key-Rotatable and Security-Updatable Homomorphic Encryption., , , and . SCC@AsiaCCS, page 35-42. ACM, (2017)Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from DLP or LWE., and . IACR Cryptol. ePrint Arch., (2023)Scalable and Secure Logistic Regression via Homomorphic Encryption., , , and . CODASPY, page 142-144. ACM, (2016)Anonymous Broadcast Authentication with Logarithmic-Order Ciphertexts from LWE., and . CANS, volume 14342 of Lecture Notes in Computer Science, page 28-50. Springer, (2023)A Generic yet Efficient Method for Secure Inner Product., , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 217-232. Springer, (2017)A faster method for computing Gama-Nguyen-Regev's extreme pruning coefficients.. CoRR, (2014)