Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Variations of the McEliece Cryptosystem., , , , , and . CoRR, (2016)Constructing abelian surfaces for cryptography via Rosenhain invariants., , , and . LMS J. Comput. Math., 17 (Theory): 157-180 (2014)A Cryptographic Hash Function from Markoff Triples., , , and . CoRR, (2021)The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences., and . Selected Areas in Cryptography, volume 5381 of Lecture Notes in Computer Science, page 309-327. Springer, (2008)SalsaPicante: A Machine Learning Attack on LWE with Binary Secrets., , , , , , and . CCS, page 2606-2620. ACM, (2023)Ring-LWE Cryptography for the Number Theorist., , , and . IACR Cryptology ePrint Archive, (2015)Improved Weil and Tate Pairings for Elliptic and Hyperelliptic Curves., , and . ANTS, volume 3076 of Lecture Notes in Computer Science, page 169-183. Springer, (2004)Manual for Using Homomorphic Encryption for Bioinformatics., , , , , and . Proc. IEEE, 105 (3): 552-567 (2017)Secure Data Exchange: A Marketplace in the Cloud., , , , and . CCSW, page 117-128. ACM, (2019)Homomorphic Computation of Edit Distance., , and . Financial Cryptography Workshops, volume 8976 of Lecture Notes in Computer Science, page 194-212. Springer, (2015)