Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lower Bounds for Collusion-Secure Fingerprinting, , , , and . (2003)Outsourcing Computation: The Minimal Refereed Mechanism., , , and . WINE, volume 11920 of Lecture Notes in Computer Science, page 256-270. Springer, (2019)Limits on the Hardness of Lattice Problems in ell _p Norms.. CCC, page 333-346. IEEE Computer Society, (2007)Lattices that admit logarithmic worst-case to average-case connection factors., and . STOC, page 478-487. ACM, (2007)An update on SIPHER (Scalable Implementation of Primitives for Homomorphic EncRyption) - FPGA implementation using Simulink., , , and . HPEC, page 1-5. IEEE, (2012)Hardness of Bounded Distance Decoding on Lattices in ℓp Norms., and . CCC, volume 169 of LIPIcs, page 36:1-36:21. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)On Error Correction in the Exponent.. TCC, volume 3876 of Lecture Notes in Computer Science, page 167-183. Springer, (2006)Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem.. Theoretical Foundations of Practical Information Security, volume 08491 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2008)Vector and Functional Commitments from Lattices., , and . TCC (3), volume 13044 of Lecture Notes in Computer Science, page 480-511. Springer, (2021)Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE., and . CRYPTO (2), volume 9815 of Lecture Notes in Computer Science, page 659-680. Springer, (2016)