Author of the publication

The Cool and the Cruel: Separating Hard Parts of LWE Secrets.

, , , , , , and . AFRICACRYPT, volume 14861 of Lecture Notes in Computer Science, page 428-453. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ring-LWE Cryptography for the Number Theorist., , , and . IACR Cryptology ePrint Archive, (2015)Variations of the McEliece Cryptosystem., , , , , and . CoRR, (2016)A Cryptographic Hash Function from Markoff Triples., , , and . CoRR, (2021)SalsaPicante: A Machine Learning Attack on LWE with Binary Secrets., , , , , , and . CCS, page 2606-2620. ACM, (2023)The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences., and . Selected Areas in Cryptography, volume 5381 of Lecture Notes in Computer Science, page 309-327. Springer, (2008)Constructing abelian surfaces for cryptography via Rosenhain invariants., , , and . LMS J. Comput. Math., 17 (Theory): 157-180 (2014)Improved Weil and Tate Pairings for Elliptic and Hyperelliptic Curves., , and . ANTS, volume 3076 of Lecture Notes in Computer Science, page 169-183. Springer, (2004)Secure Data Exchange: A Marketplace in the Cloud., , , , and . CCSW, page 117-128. ACM, (2019)Manual for Using Homomorphic Encryption for Bioinformatics., , , , , and . Proc. IEEE, 105 (3): 552-567 (2017)A Gross-Zagier formula for quaternion algebras over totally real fields., and . IACR Cryptology ePrint Archive, (2011)