Author of the publication

Compact Encryption Based on Module-NTRU Problems.

, , , , , and . PQCrypto (1), volume 14771 of Lecture Notes in Computer Science, page 371-405. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamics of feedback neural nets with unsupervised learning., , and . IJCNN, page 239-244. IEEE, (1990)An improved compression technique for signatures based on learning with errors., and . IACR Cryptol. ePrint Arch., (2013)Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance., , , and . IACR Cryptol. ePrint Arch., (2020)A Wireless Fatigue Monitoring System Utilizing a Bio-Inspired Tree Ring Data Tracking Technique., , , , and . Sensors, 14 (3): 4364-4383 (2014)Defending Sensor Worm Attack Using Software Diversity Approach., , , and . ICC, page 1-5. IEEE, (2011)A Refined Analysis of the Cost for Solving LWE via uSVP., , and . AFRICACRYPT, volume 11627 of Lecture Notes in Computer Science, page 181-205. Springer, (2019)A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes., , and . CRYPTO (1), volume 9814 of Lecture Notes in Computer Science, page 153-178. Springer, (2016)DARP: Distance-aware relay placement in WiMAX mesh networks., , , , and . INFOCOM, page 2060-2068. IEEE, (2011)An Aggregate Anonymous Credential Scheme in C-ITS for Multi-Service with Revocation., , , , , , and . TrustCom, page 452-459. IEEE, (2021)A Revocable Zone Encryption Scheme with Anonymous Authentication for C-ITS., , , , , , and . TrustCom, page 232-239. IEEE, (2021)