Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics., , and . NSS, volume 13787 of Lecture Notes in Computer Science, page 66-85. Springer, (2022)Steepest Gradient-Based Orthogonal Precoder For Integer-Forcing MIMO., , , and . CoRR, (2019)On massive MIMO physical layer cryptosystem., and . ITW Fall, page 292-296. IEEE, (2015)Implementation of a two-way relay network with compute-and-forward in GNU Radio., , and . Trans. Emerg. Telecommun. Technol., 27 (4): 484-493 (2016)Practical Post-quantum Few-Time Verifiable Random Function with Applications to Algorand., , , , , , and . Financial Cryptography (2), volume 12675 of Lecture Notes in Computer Science, page 560-578. Springer, (2021)Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy., , , , , , and . ESORICS (2), volume 12973 of Lecture Notes in Computer Science, page 24-43. Springer, (2021)Result Pattern Hiding Searchable Encryption for Conjunctive Queries., , , , , , , , and . CCS, page 745-762. ACM, (2018)MPSign: A Signature from Small-Secret Middle-Product Learning with Errors., , , , , , , and . Public Key Cryptography (2), volume 12111 of Lecture Notes in Computer Science, page 66-93. Springer, (2020)CRYSTALS-Kyber With Lattice Quantizer., and . ISIT, page 2886-2891. IEEE, (2024)Lattice-Based Vulnerabilities in Lee Metric Post-Quantum Cryptosystems., , , , and . CoRR, (2024)