From post

Cryptanalysis of a Privacy Preserving Auditing for Data Integrity Protocol from TrustCom 2013.

, и . ISPEC, том 10060 из Lecture Notes in Computer Science, стр. 37-47. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Practical Scheme for Secure Outsourcing of Coppersmith's Algorithm., и . KSEM (2), том 11776 из Lecture Notes in Computer Science, стр. 229-240. Springer, (2019)Secure outsourcing of large matrix determinant computation., , и . Frontiers Comput. Sci., (февраля 2020)Cryptanalysis of a Homomorphic Encryption Scheme Over Integers., , и . Inscrypt, том 10143 из Lecture Notes in Computer Science, стр. 243-252. Springer, (2016)Cryptanalysis of a Fast Private Information Retrieval Protocol., и . AsiaPKC@AsiaCCS, стр. 56-60. ACM, (2016)Improved Nguyen-Vidick heuristic sieve algorithm for shortest vector problem., , , и . AsiaCCS, стр. 1-9. ACM, (2011)Cryptanalysis of a homomorphic encryption scheme from ISIT 2008., , и . ISIT, стр. 2152-2156. IEEE, (2012)A New Discrete Gaussian Sampler over Orthogonal Lattices., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (11): 1880-1887 (2018)Secure Outsourcing of Lattice Basis Reduction., и . ICONIP (2), том 11954 из Lecture Notes in Computer Science, стр. 603-615. Springer, (2019)Sub-linear root detection, and new hardness results, for sparse polynomials over finite fields., , и . ISSAC, стр. 61-68. ACM, (2013)Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences., , , , , и . Public Key Cryptography, том 8383 из Lecture Notes in Computer Science, стр. 185-202. Springer, (2014)