Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-precision RNS-CKKS on fixed but smaller word-size architectures: theory and application., , , , , , , , , and 4 other author(s). WAHC@CCS, page 23-34. ACM, (2023)(In)Security of Ring-LWE Under Partial Key Exposure., , , and . J. Math. Cryptol., 15 (1): 72-86 (2021)Towards a Ring Analogue of the Leftover Hash Lemma., , , and . J. Math. Cryptol., 15 (1): 87-110 (2021)Improved Robustness and Versatility of Lattice-Based Cryptography.. University of Maryland, College Park, MD, USA, (2021)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/27405).On the Leakage Resilience of Ideal-Lattice Based Public Key Encryption., , , and . IACR Cryptology ePrint Archive, (2017)BKW Meets Fourier New Algorithms for LPN with Sparse Parities., , , and . TCC (2), volume 13043 of Lecture Notes in Computer Science, page 658-688. Springer, (2021)LWE with Side Information: Attacks and Concrete Security Estimation., , , and . CRYPTO (2), volume 12171 of Lecture Notes in Computer Science, page 329-358. Springer, (2020)Refined Security Estimation for LWE with Hints via a Geometric Approach., , , and . IACR Cryptol. ePrint Arch., (2022)Revisiting Security Estimation for LWE with Hints from a Geometric Perspective., , , and . CRYPTO (5), volume 14085 of Lecture Notes in Computer Science, page 748-781. Springer, (2023)Partial Key Exposure in Ring-LWE-Based Cryptosystems: Attacks and Resilience., , , and . IACR Cryptology ePrint Archive, (2018)