Author of the publication

Lattice Trapdoors and IBE from Middle-Product LWE.

, , and . TCC (1), volume 11891 of Lecture Notes in Computer Science, page 24-54. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revocable Cryptography from Learning with Errors., , and . TCC (4), volume 14372 of Lecture Notes in Computer Science, page 93-122. Springer, (2023)Planting Undetectable Backdoors in Machine Learning Models : Extended Abstract., , , and . FOCS, page 931-942. IEEE, (2022)NeuraCrypt: Hiding Private Health Data via Random Neural Networks for Public Training., , , , , , , , and . CoRR, (2021)Quantum Advantage from Any Non-local Game., , , and . STOC, page 1617-1628. ACM, (2023)Layout Graphs, Random Walks and the t-Wise Independence of SPN Block Ciphers., , , and . CRYPTO (3), volume 14083 of Lecture Notes in Computer Science, page 694-726. Springer, (2023)Locally Verifiable Signature and Key Aggregation., and . CRYPTO (2), volume 13508 of Lecture Notes in Computer Science, page 761-791. Springer, (2022)Asymptotically Quasi-Optimal Cryptography., , , , and . EUROCRYPT (1), volume 13275 of Lecture Notes in Computer Science, page 303-334. Springer, (2022)SoK: Learning with Errors, Circular Security, and Fully Homomorphic Encryption., and . Public Key Cryptography (4), volume 14604 of Lecture Notes in Computer Science, page 291-321. Springer, (2024)One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval., , , , and . IACR Cryptol. ePrint Arch., (2022)Rate-1 Non-Interactive Arguments for Batch-NP and Applications., , , and . FOCS, page 1057-1068. IEEE, (2022)