Author of the publication

Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption.

, , , , , , and . CCS, page 763-780. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementation of a two-way relay network with compute-and-forward in GNU Radio., , and . Trans. Emerg. Telecommun. Technol., 27 (4): 484-493 (2016)Steepest Gradient-Based Orthogonal Precoder For Integer-Forcing MIMO., , , and . CoRR, (2019)Practical MP-LWE-based encryption balancing security-risk vs. efficiency., , and . IACR Cryptology ePrint Archive, (2019)On massive MIMO physical layer cryptosystem., and . ITW Fall, page 292-296. IEEE, (2015)Cycle structure of permutation functions over finite fields and their applications., , and . Adv. Math. Commun., 6 (3): 347-361 (2012)Incremental symmetric puncturable encryption with support for unbounded number of punctures., , and . Des. Codes Cryptogr., 91 (4): 1401-1426 (April 2023)Practical $$MP - LWE $$ -based encryption balancing security-risk versus efficiency., , and . Des. Codes Cryptogr., 87 (12): 2847-2884 (2019)Ambiguity and Deficiency of Permutations Over Finite Fields With Linearized Difference Map., , , , and . IEEE Trans. Inf. Theory, 59 (9): 5616-5626 (2013)Collaborative analysis of genomic data: vision and challenges., , , , and . CoRR, (2022)ACE: A Consent-Embedded privacy-preserving search on genomic database., , , , , and . CoRR, (2023)