Author of the publication

Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE.

, , , , , , , and . ACM Conference on Computer and Communications Security, page 1006-1018. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-preserving matrix factorization., , , , , and . ACM Conference on Computer and Communications Security, page 801-812. ACM, (2013)Attribute-Based Encryption for Arithmetic Circuits., , and . IACR Cryptology ePrint Archive, (2013)Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits., , , , , , , and . EUROCRYPT, volume 8441 of Lecture Notes in Computer Science, page 533-556. Springer, (2014)Privacy-Preserving Ridge Regression on Hundreds of Millions of Records., , , , , and . IEEE Symposium on Security and Privacy, page 334-348. IEEE Computer Society, (2013)Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes., , and . ACNS, volume 10355 of Lecture Notes in Computer Science, page 457-477. Springer, (2017)Optimal heuristic algorithms for the image of an injective function., , , and . Electronic Colloquium on Computational Complexity (ECCC), (2011)Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE., , , , , , , and . ACM Conference on Computer and Communications Security, page 1006-1018. ACM, (2016)Practical post-quantum key agreement from generic lattices (invited talk).. STOC, page 8. ACM, (2017)Homomorphic Decryption in Blockchains via Compressed Discrete-Log Lookup Tables., , and . DPM/CBT@ESORICS, volume 13140 of Lecture Notes in Computer Science, page 328-339. Springer, (2021)