Author of the publication

Design and implementation of low-depth pairing-based homomorphic encryption scheme.

, , and . J. Cryptogr. Eng., 9 (2): 185-201 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Better security levels for broken arrows., , and . Media Forensics and Security, volume 7541 of SPIE Proceedings, page 75410H. SPIE, (2010)COS Ciphers are not "extremely weak"! - The Design Rationale of COS Ciphers., and . IACR Cryptology ePrint Archive, (2001)Towards robust and secure watermarking., , and . MM&Sec, page 153-160. ACM, (2010)New results about Tu-Deng's conjecture., , and . ISIT, page 485-489. IEEE, (2016)A New Ultrafast Stream Cipher Design: COS Ciphers., and . IMACC, volume 2260 of Lecture Notes in Computer Science, page 85-98. Springer, (2001)A note on Ring-LWE security in the case of Fully Homomorphic Encryption., and . IACR Cryptology ePrint Archive, (2016)Highly Nonlinear Balanced Boolean Functions with a Good Correlation-Immunity., and . EUROCRYPT, volume 1403 of Lecture Notes in Computer Science, page 475-488. Springer, (1998)A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols., , and . SP, page 125-141. IEEE, (2022)A theoretical study of watermarking security., , and . ISIT, page 1868-1872. IEEE, (2005)Links between cryptography and information hiding., and . Security and Watermarking of Multimedia Contents, volume 4675 of SPIE Proceedings, page 269-280. SPIE, (2002)