From post

Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics.

, , , , и . CD-ARES Workshops, том 8128 из Lecture Notes in Computer Science, стр. 55-74. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Practical Packing Method in Somewhat Homomorphic Encryption., , , , и . DPM/SETOP, том 8247 из Lecture Notes in Computer Science, стр. 34-50. Springer, (2013)Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm., , , и . Public Key Cryptography, том 1431 из Lecture Notes in Computer Science, стр. 253-257. Springer, (1998)Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption., , , , и . ACISP, том 8544 из Lecture Notes in Computer Science, стр. 338-353. Springer, (2014)Efficient Implementation of Schoof's Algorithm., , , и . ASIACRYPT, том 1514 из Lecture Notes in Computer Science, стр. 66-79. Springer, (1998)Generalized Security Analysis of the Random Key Bits Leakage Attack., , и . WISA, том 7115 из Lecture Notes in Computer Science, стр. 13-27. Springer, (2011)Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2., , и . Public Key Cryptography, том 1751 из Lecture Notes in Computer Science, стр. 210-222. Springer, (2000)Secure Data Devolution: Practical Re-encryption with Auxiliary Data in LWE-based Somewhat Homomorphic Encryption., , , , и . SCC@ASIACCS, стр. 53-61. ACM, (2015)On the Strength Comparison of the ECDLP and the IFP., , , и . SCN, том 7485 из Lecture Notes in Computer Science, стр. 302-325. Springer, (2012)Analysis of Lattice Reduction Attack against the Somewhat Homomorphic Encryption Based on Ideal Lattices., , , и . EuroPKI, том 7868 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2012)Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption., , , , и . ACISP, том 9144 из Lecture Notes in Computer Science, стр. 471-487. Springer, (2015)