Author of the publication

Practical Analysis of Key Recovery Attack Against Search-LWE Problem.

, , , and . IWSEC, volume 9836 of Lecture Notes in Computer Science, page 164-181. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Jittor: a novel deep learning framework with meta-operators and unified graph execution., , , , and . Sci. China Inf. Sci., (2020)Calibration and data preprocessing for the flight experiment of Chinese spaceborne precipitation measurement radar., , , , and . IGARSS, page 949-952. IEEE, (2011)Performance evaluation of China spaceborne precipitation radar: Preliminary results from airborne radar field campaign., , , , and . IGARSS, page 3233-3236. IEEE, (2011)Practical Analysis of Key Recovery Attack Against Search-LWE Problem., , , and . IWSEC, volume 9836 of Lecture Notes in Computer Science, page 164-181. Springer, (2016)Low-Rank Tucker Approximation of a Tensor From Streaming Data., , , , and . CoRR, (2019)Equivalence checking of scheduling in high-level synthesis., , , , and . ISQED, page 257-262. IEEE, (2015)AMPS: a flexible, scalable proxy testbed for implementing streaming services., , , , , , and . NOSSDAV, page 116-121. ACM, (2004)Predicate Abstraction of RTL Verilog Descriptions Using Constraint Logic Programming., , , and . ATVA, volume 3707 of Lecture Notes in Computer Science, page 174-186. Springer, (2005)AE-OT-GAN: Training GANs from data specific latent distribution, , , , , , and . (2020)cite arxiv:2001.03698.Mobile Robot Manipulation System with a Reconfigurable Robotic Arm: Design and Experiment., , , , and . ROBIO, page 2378-2383. IEEE, (2019)