Author of the publication

Verifiable Rotation of Homomorphic Encryptions.

, , , and . Public Key Cryptography, volume 5443 of Lecture Notes in Computer Science, page 393-410. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifiable Rotation of Homomorphic Encryptions., , , and . Public Key Cryptography, volume 5443 of Lecture Notes in Computer Science, page 393-410. Springer, (2009)Practical Secure Decision Tree Learning in a Teletreatment Application., , , and . Financial Cryptography, volume 8437 of Lecture Notes in Computer Science, page 179-194. Springer, (2014)Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming., , and . AFRICACRYPT, volume 9646 of Lecture Notes in Computer Science, page 265-284. Springer, (2016)Privacy-Preserving Verification of Clinical Research., , , , , , and . Sicherheit, volume P-228 of LNI, page 481-500. GI, (2013)Secure Multiparty Linear Programming Using Fixed-Point Arithmetic., and . ESORICS, volume 6345 of Lecture Notes in Computer Science, page 134-150. Springer, (2010)Improved Primitives for Secure Multiparty Integer Computation., and . SCN, volume 6280 of Lecture Notes in Computer Science, page 182-199. Springer, (2010)Flow-based reputation with uncertainty: Evidence-Based Subjective Logic., , and . CoRR, (2014)A Multi-layer Recursive Residue Number System., , , , and . ISIT, page 1460-1464. IEEE, (2018)Flow-based reputation with uncertainty: evidence-based subjective logic., , and . Int. J. Inf. Sec., 15 (4): 381-402 (2016)