Author of the publication

Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and A Fast Implementation in WebAssembly.

, , , , , and . AsiaCCS, page 685-697. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Attrapadung, Nuttapong
add a person with the name Attrapadung, Nuttapong
 

Other publications of authors with the same name

Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations., and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 100-120. Springer, (2005)Broadcast encryption with short keys and transmissions., , and . Digital Rights Management Workshop, page 55-66. ACM, (2003)Conjunctive Broadcast and Attribute-Based Encryption., and . Pairing, volume 5671 of Lecture Notes in Computer Science, page 248-265. Springer, (2009)Oblivious Linear Group Actions and Applications., , , , , , , and . CCS, page 630-650. ACM, (2021)Attribute-Based Signatures for Circuits from Bilinear Map., , and . Public Key Cryptography (1), volume 9614 of Lecture Notes in Computer Science, page 283-300. Springer, (2016)A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption., , , and . Public Key Cryptography, volume 8383 of Lecture Notes in Computer Science, page 275-292. Springer, (2014)Time-Specific Encryption from Forward-Secure Encryption., , , , , and . SCN, volume 7485 of Lecture Notes in Computer Science, page 184-204. Springer, (2012)Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation., , , , , , , and . CoRR, (2021)A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List., , , and . ACNS, volume 8479 of Lecture Notes in Computer Science, page 419-437. Springer, (2014)Unbounded Dynamic Predicate Compositions in Attribute-Based Encryption.. EUROCRYPT (1), volume 11476 of Lecture Notes in Computer Science, page 34-67. Springer, (2019)