Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013., , , , , and . Des. Codes Cryptogr., 90 (10): 2301-2318 (2022)Analysis of Citrus Diseases and Classification Based on Deep Learning Models., , and . J. Uncertain Syst., 15 (3): 2241010:1-2241010:17 (2022)Ad Hoc Multi-Input Functional Encryption., , , , , and . IACR Cryptol. ePrint Arch., (2019)Trace and Revoke with Optimal Parameters from Polynomial Hardness., , , and . IACR Cryptol. ePrint Arch., (2022)Multi-input Quadratic Functional Encryption from Pairings., , and . CRYPTO (4), volume 12828 of Lecture Notes in Computer Science, page 208-238. Springer, (2021)Deniable Fully Homomorphic Encryption from Learning with Errors., , and . CRYPTO (2), volume 12826 of Lecture Notes in Computer Science, page 641-670. Springer, (2021)Attribute Based Encryption for Deterministic Finite Automata from \mathsfDLIN., , and . TCC (2), volume 11892 of Lecture Notes in Computer Science, page 91-117. Springer, (2019)Functional Encryption for Bounded Collusions, Revisited., and . TCC (1), volume 10677 of Lecture Notes in Computer Science, page 173-205. Springer, (2017)Indistinguishability Obfuscation Without Multilinear Maps: New Methods for Bootstrapping and Instantiation.. EUROCRYPT (1), volume 11476 of Lecture Notes in Computer Science, page 191-225. Springer, (2019)Efficient Lattice (H)IBE in the Standard Model., , and . EUROCRYPT, volume 6110 of Lecture Notes in Computer Science, page 553-572. Springer, (2010)