Author of the publication

Solving Small Exponential ECDLP in EC-Based Additively Homomorphic Encryption and Applications.

, , , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection., , , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher., , and . Cryptogr. Commun., 6 (3): 233-254 (2014)Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis., , , , , , , and . ISC, volume 9290 of Lecture Notes in Computer Science, page 141-157. Springer, (2015)Improved Differential Analysis of Block Cipher PRIDE., , , , , , and . ISPEC, volume 9065 of Lecture Notes in Computer Science, page 209-219. Springer, (2015)Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s., , , , , and . IWSEC, volume 9241 of Lecture Notes in Computer Science, page 97-111. Springer, (2015)Solving Small Exponential ECDLP in EC-Based Additively Homomorphic Encryption and Applications., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)A Triple-Error-Correcting Cyclic Code from the Gold and Kasami-Welch APN Power Functions, , and . CoRR, (2010)Is Vertical Logistic Regression Privacy-Preserving? A Comprehensive Privacy Analysis and Beyond., , , , , , , and . CoRR, (2022)CoGNN: Towards Secure and Efficient Collaborative Graph Learning (Artifacts)., , , , , and . (May 2024)Improved Differential Analysis of Block Cipher PRIDE., , , , , , and . IACR Cryptology ePrint Archive, (2014)