Author of the publication

Cryptanalysis of an NTRU-Based Proxy Encryption Scheme from ASIACCS'15.

, , and . PQCrypto, volume 11505 of Lecture Notes in Computer Science, page 153-166. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M., , , , , and . CARDIS, volume 11389 of Lecture Notes in Computer Science, page 95-110. Springer, (2018)Fully Homomorphic Encryption from the Finite Field Isomorphism Problem., , , , , , and . Public Key Cryptography (1), volume 10769 of Lecture Notes in Computer Science, page 125-155. Springer, (2018)Improving Class Activation Map for Weakly Supervised Object Localization., , and . ICASSP, page 2624-2628. IEEE, (2022)Two-Stage Dual Augmentation with CLIP for Improved Text-to-Sketch Synthesis., and . MIPR, page 1-6. IEEE, (2023)Arrow: Capture the Inaudible Attacker in 3D Space via Smart-speaker., , , , , and . MSN, page 415-422. IEEE, (2023)Pointproofs: Aggregating Proofs for Multiple Vector Commitments., , , and . ACM Conference on Computer and Communications Security, page 2007-2023. ACM, (2020)LLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE scheme., , and . Des. Codes Cryptogr., 76 (2): 325-344 (2015)Raptor: A Practical Lattice-Based (Linkable) Ring Signature., , and . IACR Cryptology ePrint Archive, (2018)A quantum-safe circuit-extension handshake for Tor., , and . IACR Cryptology ePrint Archive, (2015)DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation - Preliminary Report., , , , , and . IACR Cryptology ePrint Archive, (2015)