Author of the publication

Bootstrapping BGV Ciphertexts with a Wider Choice of p and q.

, , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 673-698. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Orsini, Emmanuela
add a person with the name Orsini, Emmanuela
 

Other publications of authors with the same name

Computing the distance distribution of systematic non-linear codes, , and . CoRR, (2009)Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection., , and . CT-RSA, volume 10159 of Lecture Notes in Computer Science, page 381-396. Springer, (2017)Secure Oblivious Transfer from Semi-Commutative Masking., , , and . IACR Cryptology ePrint Archive, (2018)Overdrive2k: Efficient Secure MPC over Z2k from Somewhat Homomorphic Encryption., , and . IACR Cryptology ePrint Archive, (2019)Bootstrapping BGV Ciphertexts With A Wider Choice of p and q., , and . IACR Cryptology ePrint Archive, (2014)Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT)., , , and . ASIACRYPT (3), volume 11274 of Lecture Notes in Computer Science, page 86-117. Springer, (2018)Bootstrapping BGV Ciphertexts with a Wider Choice of p and q., , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 673-698. Springer, (2015)General Error Locator Polynomials for Binary Cyclic Codes With t<=2 and n<63., and . IEEE Trans. Information Theory, 53 (3): 1095-1107 (2007)BBQ: Using AES in Picnic Signatures., , , and . IACR Cryptology ePrint Archive, (2019)Bootstrapping BGV ciphertexts with a wider choice of p and q., , and . IET Information Security, 10 (6): 348-357 (2016)