Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lower Bounds for Collusion-Secure Fingerprinting, , , , and . (2003)Lattices that admit logarithmic worst-case to average-case connection factors., and . STOC, page 478-487. ACM, (2007)An update on SIPHER (Scalable Implementation of Primitives for Homomorphic EncRyption) - FPGA implementation using Simulink., , , and . HPEC, page 1-5. IEEE, (2012)Outsourcing Computation: The Minimal Refereed Mechanism., , , and . WINE, volume 11920 of Lecture Notes in Computer Science, page 256-270. Springer, (2019)Limits on the Hardness of Lattice Problems in ell _p Norms.. CCC, page 333-346. IEEE Computer Society, (2007)Hardness of Bounded Distance Decoding on Lattices in ℓp Norms., and . CCC, volume 169 of LIPIcs, page 36:1-36:21. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Lattice Cryptography for the Internet.. PQCrypto, volume 8772 of Lecture Notes in Computer Science, page 197-219. Springer, (2014)Constraining and Watermarking PRFs from Milder Assumptions., and . Public Key Cryptography (1), volume 12110 of Lecture Notes in Computer Science, page 431-461. Springer, (2020)On the Lattice Smoothing Parameter Problem., , , and . CCC, page 230-241. IEEE Computer Society, (2013)Λολ: Functional Lattice Cryptography., and . CCS, page 993-1005. ACM, (2016)