Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generic Construction of Bounded-Collusion IBE via Table-Based ID-to-Key Map., , , , and . CANS, volume 11829 of Lecture Notes in Computer Science, page 457-469. Springer, (2019)A New Dedicated 256-Bit Hash Function: FORK-256., , , , , , , and . FSE, volume 4047 of Lecture Notes in Computer Science, page 195-209. Springer, (2006)Improved Circuit-Based PSI via Equality Preserving Compression., , and . SAC, volume 13742 of Lecture Notes in Computer Science, page 190-209. Springer, (2022)Masta: An HE-Friendly Cipher Using Modular Arithmetic., , , , , , and . IEEE Access, (2020)Algebraic Attacks on Summation Generators., , , , and . FSE, volume 3017 of Lecture Notes in Computer Science, page 34-48. Springer, (2004)FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups., , , and . CT-RSA, volume 12006 of Lecture Notes in Computer Science, page 106-128. Springer, (2020)Hybrid Framework for Approximate Computation over Encrypted Data., , , , , , and . IACR Cryptol. ePrint Arch., (2020)AIM: Symmetric Primitive for Shorter Signatures with Stronger Security., , , , , , , , , and 1 other author(s). CCS, page 401-415. ACM, (2023)Transciphering Framework for Approximate Homomorphic Encryption., , , , , , , and . ASIACRYPT (3), volume 13092 of Lecture Notes in Computer Science, page 640-669. Springer, (2021)Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA., , , , and . FSE, volume 2365 of Lecture Notes in Computer Science, page 49-60. Springer, (2002)