Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transciphering Framework for Approximate Homomorphic Encryption., , , , , , , and . ASIACRYPT (3), volume 13092 of Lecture Notes in Computer Science, page 640-669. Springer, (2021)Error probability for bandlimited hybrid SFH/DS-CDMA., , and . PIMRC, page 83-87. (1996)Single-Trace Attack on NIST Round 3 Candidate Dilithium Using Machine Learning-Based Profiling., , , , , , , and . IEEE Access, (2021)Privacy-Preserving Fair Learning of Support Vector Machine with Homomorphic Encryption., , and . WWW, page 3572-3583. ACM, (2022)AIM: Symmetric Primitive for Shorter Signatures with Stronger Security., , , , , , , , , and 1 other author(s). CCS, page 401-415. ACM, (2023)Direct Energy Trading of Microgrids in Distribution Energy Market., , , and . SmartGridComm, page 1-6. IEEE, (2019)An Efficient Affine Equivalence Algorithm for Multiple S-Boxes and a Structured Affine Layer., , , and . SAC, volume 10532 of Lecture Notes in Computer Science, page 299-316. Springer, (2016)A Novel CCA Attack for NTRU+ KEM., , and . IACR Cryptol. ePrint Arch., (2023)Efficient Identity-Based Encryption from LWR., , , , and . ICISC, volume 11975 of Lecture Notes in Computer Science, page 225-241. Springer, (2019)Single-Trace Attacks on the Message Encoding of Lattice-Based KEMs., , , , , , , , and . IACR Cryptol. ePrint Arch., (2020)