Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifiable Decryption for Fully Homomorphic Encryption., and . ISC, volume 11060 of Lecture Notes in Computer Science, page 347-365. Springer, (2018)Hashing into Generalized Huff Curves., , and . Inscrypt, volume 9589 of Lecture Notes in Computer Science, page 22-44. Springer, (2015)Implementation of Multi-continued Fraction Algorithm and Application to Multi-sequence Linear Synthesis., , and . SETA, volume 4086 of Lecture Notes in Computer Science, page 248-258. Springer, (2006)Revisiting Key Switching Techniques with Applications to Light-Key FHE., , , , , and . ICISC (1), volume 14561 of Lecture Notes in Computer Science, page 41-64. Springer, (2023)Hybrid Dual and Meet-LWE Attack., , , and . ACISP, volume 13494 of Lecture Notes in Computer Science, page 168-188. Springer, (2022)Deterministic Encoding into Twisted Edwards Curves., , , , and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 285-297. Springer, (2016)Leveled Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures., , , and . ISC, volume 9290 of Lecture Notes in Computer Science, page 42-60. Springer, (2015)About Hash into Montgomery Form Elliptic Curves., , , and . ISPEC, volume 7863 of Lecture Notes in Computer Science, page 147-159. Springer, (2013)Joint Triple-Base Number System for Multi-Scalar Multiplication., , , and . ISPEC, volume 7863 of Lecture Notes in Computer Science, page 160-173. Springer, (2013)Subfield Attacks on HSVP in Ideal Lattices., , , and . Inscrypt, volume 13837 of Lecture Notes in Computer Science, page 447-462. Springer, (2022)