Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resistance of S-Boxes against Algebraic Attacks., and . FSE, volume 3017 of Lecture Notes in Computer Science, page 83-94. Springer, (2004)S-boxes with Controllable Nonlinearity., , and . EUROCRYPT, volume 1592 of Lecture Notes in Computer Science, page 286-294. Springer, (1999)A New Additive Homomorphic Encryption based on the co-ACD Problem., , and . ACM Conference on Computer and Communications Security, page 287-298. ACM, (2014)Revisiting the Hybrid Attack on Sparse Secret LWE and Application to HE Parameters., and . WAHC@CCS, page 11-20. ACM, (2019)Efficient verifiable computation over quotient polynomial rings., , and . Int. J. Inf. Sec., 21 (5): 953-971 (2022)Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption., , , and . IEEE Trans. Inf. Theory, 54 (11): 5155-5171 (2008)Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data., , and . IEEE Trans. Inf. Forensics Secur., 11 (1): 188-199 (2016)Adventures in Crypto Dark Matter: Attacks, Fixes and Analysis for Weak Pseudorandom Function Candidates., , , and . IACR Cryptol. ePrint Arch., (2020)Limits of Polynomial Packings for ℤpk and 픽pk., and . IACR Cryptol. ePrint Arch., (2021)HAETAE: Shorter Lattice-Based Fiat-Shamir Signatures., , , , , , , , , and . IACR Cryptol. ePrint Arch., (2023)