Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Windowing technique for Lazy Sorting of Encrypted data., and . CNS, page 633-637. IEEE, (2015)Authorized Update in Multi-User Homomorphic Encrypted Cloud Database., and . IEEE Trans. Knowl. Data Eng., 35 (8): 7796-7808 (August 2023)Encrypted KNN Implementation on Distributed Edge Device Network., , and . SECRYPT, page 680-685. SCITEPRESS, (2024)Accelerating Sorting of Fully Homomorphic Encrypted Data., , and . INDOCRYPT, volume 8250 of Lecture Notes in Computer Science, page 262-273. Springer, (2013)vr2FHE- Securing FHE from Reaction-based Key Recovery Attacks., , , and . IACR Cryptol. ePrint Arch., (2023)Äsk and Thou Shall Receive": Reaction-Based Full Key Recovery Attacks on FHE., , , and . ESORICS (4), volume 14985 of Lecture Notes in Computer Science, page 457-477. Springer, (2024)FPGA implementation of binary edwards curve usingternary representation., and . ACM Great Lakes Symposium on VLSI, page 73-78. ACM, (2011)FPGA implementation of extended reconfigurable Binary Edwards Curve based processor., and . ICNC, page 211-215. IEEE Computer Society, (2012)Democracy in Your Hands!: Practical Multi-key Homomorphic E-Voting., , and . ICISS, volume 14424 of Lecture Notes in Computer Science, page 259-271. Springer, (2023)Encrypted Operator Design with Domain Aware Practical Performance Improvement., , and . ICMC, volume 1412 of Advances in Intelligent Systems and Computing, page 93-107. Springer, (2021)