Author of the publication

Secure and Practical Searchable Encryption: A Position Paper.

, , , and . ACISP (1), volume 10342 of Lecture Notes in Computer Science, page 266-281. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Kangaroo Methods for Solving the Interval Discrete Logarithm Problem., and . CoRR, (2015)Constructing Isogenies between Elliptic Curves Over Finite Fields.. LMS J. Comput. Math., (1999)Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes., , and . ICITS, volume 9063 of Lecture Notes in Computer Science, page 283-296. Springer, (2015)Guest editorial: Special issue on Mathematics of Zero-Knowledge., , , and . Des. Codes Cryptogr., 91 (11): 3331-3332 (November 2023)Pairings for cryptographers., , and . Discret. Appl. Math., 156 (16): 3113-3121 (2008)Small Superset and Big Subset Obfuscation., and . ACISP, volume 13083 of Lecture Notes in Computer Science, page 68-87. Springer, (2021)Weil Descent Of Jacobians.. Electron. Notes Discret. Math., (2001)Tunable Balancing of RSA., , and . ACISP, volume 3574 of Lecture Notes in Computer Science, page 280-292. Springer, (2005)Extending the GHS Weil Descent Attack., , and . EUROCRYPT, volume 2332 of Lecture Notes in Computer Science, page 29-44. Springer, (2002)Summation Polynomial Algorithms for Elliptic Curves in Characteristic Two., and . INDOCRYPT, volume 8885 of Lecture Notes in Computer Science, page 409-427. Springer, (2014)