Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lower Bounds for Collusion-Secure Fingerprinting, , , , and . (2003)Cryptanalysis of Lattice-Based Sequentiality Assumptions and Proofs of Sequential Work., and . IACR Cryptol. ePrint Arch., (2023)Improved Hardness of BDD and SVP Under Gap-(S)ETH., , and . ITCS, volume 215 of LIPIcs, page 19:1-19:12. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Constraining and Watermarking PRFs from Milder Assumptions., and . Public Key Cryptography (1), volume 12110 of Lecture Notes in Computer Science, page 431-461. Springer, (2020)A Decade of Lattice Cryptography.. IACR Cryptology ePrint Archive, (2015)Lattice Cryptography for the Internet.. PQCrypto, volume 8772 of Lecture Notes in Computer Science, page 197-219. Springer, (2014)Multi-key FHE from LWE, Revisited., and . TCC (B2), volume 9986 of Lecture Notes in Computer Science, page 217-238. (2016)Λολ: Functional Lattice Cryptography., and . CCS, page 993-1005. ACM, (2016)On the Lattice Smoothing Parameter Problem., , , and . CCC, page 230-241. IEEE Computer Society, (2013)Privately Constraining and Programming PRFs, the LWE Way., and . IACR Cryptology ePrint Archive, (2017)