Author of the publication

Finding and Evaluating Parameters for BGV.

, , , , and . AFRICACRYPT, volume 14064 of Lecture Notes in Computer Science, page 370-394. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guidance for Efficient Selection of Secure Parameters for Fully Homomorphic Encryption., , and . AFRICACRYPT, volume 14861 of Lecture Notes in Computer Science, page 376-400. Springer, (2024)Survey on Fully Homomorphic Encryption, Theory, and Applications., , , , , and . IACR Cryptol. ePrint Arch., (2022)Improving and Automating BFV Parameters Selection: An Average-Case Approach., , , and . IACR Cryptol. ePrint Arch., (2023)On the Hermitian curve and its intersections with some conics., , and . Finite Fields Their Appl., (2014)Advances and Challenges of Rank Metric Cryptography Implementations., , , , , and . ICCD, page 325-328. IEEE, (2019)Two novel applications of bilinear groups to ABE encryption., , and . IACR Cryptology ePrint Archive, (2014)Finding and Evaluating Parameters for BGV., , , , and . AFRICACRYPT, volume 14064 of Lecture Notes in Computer Science, page 370-394. Springer, (2023)Some security bounds for the DGHV scheme., , , and . IACR Cryptology ePrint Archive, (2014)Collaborative Multi-Authority KP-ABE for Shorter Keys and Parameters., , and . IACR Cryptology ePrint Archive, (2016)Key-Policy Multi-authority Attribute-Based Encryption., , and . CAI, volume 9270 of Lecture Notes in Computer Science, page 152-164. Springer, (2015)