Author of the publication

Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions.

, , , and . Des. Codes Cryptogr., 90 (8): 1735-1760 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

(In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps., , and . Des. Codes Cryptogr., 89 (5): 973-1016 (2021)Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map., , , , and . IACR Cryptol. ePrint Arch., (2018)Adventures in Crypto Dark Matter: Attacks and Fixes for Weak Pseudorandom Functions., , , and . Public Key Cryptography (2), volume 12711 of Lecture Notes in Computer Science, page 739-760. Springer, (2021)A Flash Tier For Tiered Transaction Storage System.. Georgia Institute of Technology, Atlanta, GA, USA, (2021)base-search.net (ftgeorgiatech:oai:smartech.gatech.edu:1853/64603).Homomorphic Multiple Precision Multiplication for CKKS and Reduced Modulus Consumption., , , and . CCS, page 696-710. ACM, (2023)Effective Pre-processing Methods with DTG Big Data by Using MapReduce Techniques., and . CSA/CUTE, volume 421 of Lecture Notes in Electrical Engineering, page 389-395. Springer, (2016)Multimedia Sensor Dataset for the Analysis of Vehicle Movement., and . MMSys, page 175-180. ACM, (2017)Improved Universal Thresholdizer from Threshold Fully Homomorphic Encryption., , and . IACR Cryptol. ePrint Arch., (2023)Semiparametric Kernel Fisher Discriminant Approach for Regression Problems., , and . Int. J. Fuzzy Log. Intell. Syst., 3 (2): 227-232 (2003)META-BTS: Bootstrapping Precision Beyond the Limit., , , , and . CCS, page 223-234. ACM, (2022)