Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacks on Image Encryption Schemes for Privacy-Preserving Deep Neural Networks., and . CoRR, (2020)High-Speed Modular Multiplier for Lattice-Based Cryptosystems., , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 68 (8): 2927-2931 (2021)Private Randomized Controlled Trials: A Protocol for Industry Scale Deployment., , , , , , , and . CoRR, (2021)Error analysis of weak Poly-LWE instances., , , and . Cryptogr. Commun., 11 (3): 411-426 (2019)The Privacy-preserving Padding Problem: Non-negative Mechanisms for Conservative Answers with Differential Privacy., , and . CoRR, (2021)A Note on Sub-Gaussian Random Variables., , and . IACR Cryptology ePrint Archive, (2019)Multi-key Private Matching for Compute., , , , , , , and . IACR Cryptol. ePrint Arch., (2021)Interoperable Private Attribution: A Distributed Attribution and Aggregation Protocol., , , , , , , , and . IACR Cryptol. ePrint Arch., (2023)Delegated Private Matching for Compute., , , , , and . IACR Cryptol. ePrint Arch., (2023)Fully Homomorphic Encryption with k-bit Arithmetic Operations., , , and . IACR Cryptology ePrint Archive, (2019)