Author of the publication

Homomorphic evaluation of large look-up tables for inference on human genome data in the cloud.

, , , , and . SBAC-PADW, page 33-38. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Provendo Segurança e Privacidade em Coordenação Distribuída e Extensível., , , and . SBRC, page 267-280. (2018)Formally Verified Credentials Management for Industrial Control Systems., , and . FormaliSE@ICSE, page 75-85. IEEE, (2021)Faster Homomorphic Encryption over GPGPUs via Hierarchical DGT., , and . Financial Cryptography (2), volume 12675 of Lecture Notes in Computer Science, page 520-540. Springer, (2021)High-Assurance Field Inversion for Curve-Based Cryptography., , and . CSF, page 552-567. IEEE, (2023)PUF-Based Mutual Multifactor Entity and Transaction Authentication for Secure Banking., , and . LightSec, volume 9542 of Lecture Notes in Computer Science, page 77-96. Springer, (2015)Cylindrical Reconvergence Physical Unclonable Function., , , and . DSD, page 446-453. IEEE Computer Society, (2016)Software Implementation of Binary Elliptic Curves: Impact of the Carry-Less Multiplier on Scalar Multiplication., , , , , and . CHES, volume 6917 of Lecture Notes in Computer Science, page 108-123. Springer, (2011)A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA)., , , and . SPACE, volume 10662 of Lecture Notes in Computer Science, page 170-189. Springer, (2017)Secure-TWS: Authenticating Node to Multi-user Communication in Shared Sensor Networks., , , , , , , and . Comput. J., 55 (4): 384-396 (2012)TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks., , , , , , and . Comput. Commun., 34 (3): 485-493 (2011)