Author of the publication

Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and A Fast Implementation in WebAssembly.

, , , , , and . AsiaCCS, page 685-697. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Teruya, Tadanori
add a person with the name Teruya, Tadanori
 

Other publications of authors with the same name

Faster Explicit Formulae for Computing Pairings via Elliptic Nets and Their Parallel Computation., , , and . IWSEC, volume 9836 of Lecture Notes in Computer Science, page 319-334. Springer, (2016)High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves., , , , , and . Pairing, volume 6487 of Lecture Notes in Computer Science, page 21-39. Springer, (2010)Constant-Round Client-Aided Secure Comparison Protocol., , , , , and . ESORICS (2), volume 11099 of Lecture Notes in Computer Science, page 395-415. Springer, (2018)On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data., , , and . IWSEC, volume 9241 of Lecture Notes in Computer Science, page 242-261. Springer, (2015)Constructing Symmetric Pairings over Supersingular Elliptic Curves with Embedding Degree Three., , , , , and . Pairing, volume 8365 of Lecture Notes in Computer Science, page 97-112. Springer, (2013)Secure Parallel Computation on Privately Partitioned Data and Applications., , , , , and . CCS, page 151-164. ACM, (2022)Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 103-A (1): 21-32 (2020)Efficient Estimation of Number of Short Lattice Vectors in Search Space under Randomness Assumption., , and . APKC@AsiaCCS, page 13-22. ACM, (2019)MOBIUS: Model-Oblivious Binarized Neural Networks., , , , , , , , , and . CoRR, (2018)Attribute Based Encryption with Direct Efficiency Tradeoff., , , , and . ACNS, volume 9696 of Lecture Notes in Computer Science, page 249-266. Springer, (2016)