Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FHE Circuit Privacy Almost for Free., , , and . CRYPTO (2), volume 9815 of Lecture Notes in Computer Science, page 62-89. Springer, (2016)Fast Homomorphic Evaluation of Deep Discretized Neural Networks., , , and . CRYPTO (3), volume 10993 of Lecture Notes in Computer Science, page 483-512. Springer, (2018)From Rational Number Reconstruction to Set Reconciliation and File Synchronization., , , , , and . TGC, volume 8191 of Lecture Notes in Computer Science, page 1-18. Springer, (2012)Balanced graph edge partition., , and . KDD, page 1456-1465. ACM, (2014)Divisible E-Cash from Constrained Pseudo-Random Functions., , and . ASIACRYPT (1), volume 11921 of Lecture Notes in Computer Science, page 679-708. Springer, (2019)Improved Secure Integer Comparison via Homomorphic Encryption., , and . IACR Cryptology ePrint Archive, (2019)Simple Functional Encryption Schemes for Inner Products., , , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 733-751. Springer, (2015)CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions., , and . Public Key Cryptography (2), volume 10175 of Lecture Notes in Computer Science, page 36-66. Springer, (2017)Fast Homomorphic Evaluation of Deep Discretized Neural Networks., , , and . IACR Cryptology ePrint Archive, (2017)Better Security for Functional Encryption for Inner Product Evaluations., , , and . IACR Cryptology ePrint Archive, (2016)