Author of the publication

Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts.

, , , and . ACNS (1), volume 12726 of Lecture Notes in Computer Science, page 460-479. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Homomorphic Computation of Edit Distance., , and . Financial Cryptography Workshops, volume 8976 of Lecture Notes in Computer Science, page 194-212. Springer, (2015)Homomorphic Computation of Local Alignment., , , , , and . BIBM, page 2167-2174. IEEE, (2020)ViziCal: accurate energy expenditure prediction for playing exergames., , , and . UIST, page 397-404. ACM, (2013)Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts., , , and . IACR Cryptol. ePrint Arch., (2020)Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference., , , and . CCS, page 395-412. ACM, (2019)Accelerating HE Operations from Key Decomposition Technique., , , and . CRYPTO (4), volume 14084 of Lecture Notes in Computer Science, page 70-92. Springer, (2023)A Full RNS Variant of Approximate Homomorphic Encryption., , , , and . SAC, volume 11349 of Lecture Notes in Computer Science, page 347-368. Springer, (2018)Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts., , , and . ACNS (1), volume 12726 of Lecture Notes in Computer Science, page 460-479. Springer, (2021)Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning., , , , , and . ASIACRYPT (3), volume 12493 of Lecture Notes in Computer Science, page 31-59. Springer, (2020)Secure Outsourced Matrix Computation and Application to Neural Networks., , , and . ACM Conference on Computer and Communications Security, page 1209-1222. ACM, (2018)