Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Approximate Nearest Neighbor Search with Locality-Sensitive Hashing., , , , and . ESORICS (3), volume 14346 of Lecture Notes in Computer Science, page 411-430. Springer, (2023)Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext., , , , , and . AsiaCCS, page 201-210. ACM, (2016)Hybrid Routing: Towards Resilient Routing in Anonymous Communication Networks., , , , and . ICC, page 1-7. IEEE, (2020)A Real-Time Aware Routing Strategy in Smart City Environments., , , , and . SECON Workshops, page 9-14. IEEE, (2018)Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyber., , , , and . Inscrypt (2), volume 14527 of Lecture Notes in Computer Science, page 111-129. Springer, (2023)Subversion-Resilient Public Key Encryption with Practical Watchdogs., , and . Public Key Cryptography (1), volume 12710 of Lecture Notes in Computer Science, page 627-658. Springer, (2021)Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved., , , , , and . CRYPTO (4), volume 12828 of Lecture Notes in Computer Science, page 270-300. Springer, (2021)Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience., , , , , , and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 112-132. Springer, (2018)A New General Framework for Secure Public Key Encryption with Keyword Search., , , , and . ACISP, volume 9144 of Lecture Notes in Computer Science, page 59-76. Springer, (2015)Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption., , and . ASIACRYPT (2), volume 12492 of Lecture Notes in Computer Science, page 98-128. Springer, (2020)