Author of the publication

Augmented Learning with Errors: The Untapped Potential of the Error Term.

, , and . Financial Cryptography, volume 8975 of Lecture Notes in Computer Science, page 333-352. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Distributed Reputation System for Certification Authority Trust Management., , , , , and . TrustCom/BigDataSE/ISPA (1), page 1349-1356. IEEE, (2015)Towards a Framework on the Security Requirements for Electronic Voting Protocols., , , , and . REVOTE, page 61-68. IEEE Computer Society, (2009)Life-cycle management of X.509 certificates based on LDAP directories., , , and . Journal of Computer Security, 14 (5): 419-439 (2006)CA trust management for the Web PKI., , , , and . Journal of Computer Security, 22 (6): 913-959 (2014)Improved algebraic side-channel attack on AES., , , , , and . J. Cryptographic Engineering, 3 (3): 139-156 (2013)Towards Algebraic Cryptanalysis of HFE Challenge 2., , and . ISA, volume 200 of Communications in Computer and Information Science, page 123-131. Springer, (2011)A Signature Scheme Based on the Intractability of Computing Roots., , , and . Des. Codes Cryptogr., 25 (3): 223-236 (2002)Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures., , and . Des. Codes Cryptogr., 73 (3): 997-1022 (2014)The Status of Quantum-Based Long-Term Secure Communication over the Internet., , , , , , , , and . CoRR, (2017)LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions., and . IACR Cryptology ePrint Archive, (2014)