Author of the publication

S-boxes with Controllable Nonlinearity.

, , and . EUROCRYPT, volume 1592 of Lecture Notes in Computer Science, page 286-294. Springer, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient verifiable computation over quotient polynomial rings., , and . Int. J. Inf. Sec., 21 (5): 953-971 (2022)Cryptanalysis of the CLT13 Multilinear Map., , , , and . J. Cryptol., 32 (2): 547-565 (2019)Resistance of S-Boxes against Algebraic Attacks., and . FSE, volume 3017 of Lecture Notes in Computer Science, page 83-94. Springer, (2004)S-boxes with Controllable Nonlinearity., , and . EUROCRYPT, volume 1592 of Lecture Notes in Computer Science, page 286-294. Springer, (1999)Lizard: Cut Off the Tail! A Practical Post-quantum Public-Key Encryption from LWE and LWR., , , and . SCN, volume 11035 of Lecture Notes in Computer Science, page 160-177. Springer, (2018)Instant Privacy-Preserving Biometric Authentication for Hamming Distance., , , , , and . IACR Cryptology ePrint Archive, (2018)Fast Batch Verification of Multiple Signatures., and . Public Key Cryptography, volume 4450 of Lecture Notes in Computer Science, page 442-457. Springer, (2007)A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents., and . Public Key Cryptography, volume 4939 of Lecture Notes in Computer Science, page 328-343. Springer, (2008)An Identity-Based Signature from Gap Diffie-Hellman Groups., and . Public Key Cryptography, volume 2567 of Lecture Notes in Computer Science, page 18-30. Springer, (2003)Revisiting the Hybrid Attack on Sparse Secret LWE and Application to HE Parameters., and . WAHC@CCS, page 11-20. ACM, (2019)