Author of the publication

Batch Bootstrapping I: - A New Framework for SIMD Bootstrapping in Polynomial Modulus.

, and . EUROCRYPT (3), volume 14006 of Lecture Notes in Computer Science, page 321-352. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constant-Round MPC with Fairness and Guarantee of Output Delivery., , and . CRYPTO (2), volume 9216 of Lecture Notes in Computer Science, page 63-82. Springer, (2015)FedTrust: Towards Building Secure Robust and Trustworthy Moderators for Federated Learning., , , , and . MIPR, page 318-323. IEEE, (2022)Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model., , , , and . ASIACRYPT (4), volume 13794 of Lecture Notes in Computer Science, page 353-383. Springer, (2022)Leakage Resilient l-more Extractable Hash and Applications to Non-Malleable Cryptography., , and . IACR Cryptol. ePrint Arch., (2022)Lattice-based Commit-Transferrable Signatures and Applications to Anonymous Credentials., , , and . IACR Cryptol. ePrint Arch., (2023)On the Lattice Smoothing Parameter Problem., , , and . CoRR, (2014)Leakage Resilient Fully Homomorphic Encryption., and . IACR Cryptology ePrint Archive, (2013)Proxy Re-Encryption and Re-Signatures from Lattices., and . ACNS, volume 11464 of Lecture Notes in Computer Science, page 363-382. Springer, (2019)Memory Delegation., , , and . CRYPTO, volume 6841 of Lecture Notes in Computer Science, page 151-168. Springer, (2011)Efficient Secure Two-Party Exponentiation., , , and . CT-RSA, volume 6558 of Lecture Notes in Computer Science, page 17-32. Springer, (2011)