Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Les communications anonymes à faible latence.. INSA Toulouse, France, (2006)From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications., and . NCA, page 163-172. IEEE Computer Society, (2006)Anomaly detection for web server log reduction: A simple yet efficient crawling based approach., , and . CNS, page 586-590. IEEE, (2016)Additively Homomorphic Encryption with d-Operand Multiplications., , and . CRYPTO, volume 6223 of Lecture Notes in Computer Science, page 138-154. Springer, (2010)pMIX: Untraceability for Small Hiding Groups., and . NCA, page 29-40. IEEE Computer Society, (2005)Encrypted internet traffic classification using a supervised spiking neural network., , , , , and . Neurocomputing, (2022)SDitH in the QROM., , , , , and . ASIACRYPT (7), volume 14444 of Lecture Notes in Computer Science, page 317-350. Springer, (2023)A New Efficient Threshold Ring Signature Scheme Based on Coding Theory., , and . PQCrypto, volume 5299 of Lecture Notes in Computer Science, page 1-16. Springer, (2008)AntTrust: A Novel Ant Routing Protocol for Wireless Ad-hoc Network Based on Trust between Nodes., , , and . ARES, page 1052-1059. IEEE Computer Society, (2008)A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol., and . IACR Cryptology ePrint Archive, (2007)