Author of the publication

De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem

, , , , , , , , , and . International Journal of Information Security, (November 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Cryptography Benchmark: A View on Attribute Based Encryption Schemes, , , , , , and . 2022 5th Conference on Cloud and Internet of Things (CIoT), IEEE, (2022)Software Testing Strategies for Detecting Hypercall Handlers' Aging-related Bugs., , , , , and . ISSRE Workshops, page 48-55. IEEE, (2021)De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem, , , , , , , , , and . International Journal of Information Security, (November 2023)Software Testing Strategies for Detecting Hypercall Handlers\textquotesingle Aging-related Bugs, , , , , and . 2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), IEEE, (2021)Towards Testing the Performance Influence of Hypervisor Hypercall Interface Behavior., , , and . Softwaretechnik-Trends, 39 (4): 8-10 (2019)Towards Testing the Software Aging Behavior of Hypervisor Hypercall Interfaces, , , , , and . 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), IEEE, (November 2019)Searching for the Ground Truth: Assessing the Similarity of Benchmarking Runs., , , , , , , , and . ICPE (Companion), page 95-99. ACM, (2023)Efficient Data Processing: Assessing the Performance of Different Programming Languages., , , , and . ICPE (Companion), page 83-87. ACM, (2023)Attack-aware Security Function Chain Reordering., , , , , and . CoRR, (2020)Addressing Shortcomings of Existing DDoS Protection Software Using Software-Defined Networking., , , , and . Softwaretechnik-Trends, 39 (3): 37-39 (2019)