OpenFHE: Open-source fully homomorphic encryption library A Al Badawi, J Bates, F Bergamaschi, DB Cousins, S Erabelli, N Genise, ... Proceedings of the 10th Workshop on Encrypted Computing & Applied …, 2022 | 163 | 2022 |
Provably secure password authenticated key exchange based on RLWE for the post-quantum world J Ding, S Alsayigh, J Lancrenon, S RV, M Snook Cryptographers’ Track at the RSA conference, 183-204, 2017 | 126 | 2017 |
Leakage of signal function with reused keys in RLWE key exchange J Ding, S Alsayigh, RV Saraswathy, S Fluhrer, X Lin 2017 IEEE International Conference on Communications (ICC), 1-6, 2017 | 82 | 2017 |
Complete attack on RLWE key exchange with reused keys, without signal leakage J Ding, S Fluhrer, S Rv Australasian Conference on Information Security and Privacy, 467-486, 2018 | 69 | 2018 |
Efficient implementation of password-based authenticated key exchange from RLWE and post-quantum TLS X Gao, J Ding, L Li, RV Saraswathy, J Liu Cryptology ePrint Archive, 2017 | 18 | 2017 |
How to validate the secret of a Ring Learning with Errors (RLWE) key J Ding, RV Saraswathy, S Alsayigh, C Clough Cryptology ePrint Archive, 2018 | 16 | 2018 |
Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol X Gao, J Ding, RV Saraswathy, L Li, J Liu International Journal of High Performance Computing and Networking 13 (2 …, 2019 | 9 | 2019 |
Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite X Gao, L Li, J Ding, J Liu, RV Saraswathy, Z Liu International Conference on Information Security Practice and Experience …, 2017 | 5 | 2017 |
Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite G Xinwei, L Li, D Jintai, L Jiqiang, S Rv, Z Liu The 13th International Conference on Information Security Practice and …, 2017 | 5* | 2017 |
SYSTEM AND METHOD FOR NETWORK INTRUSION DETECTION BASED ON PHYSICAL MEASUREMENTS J Guajardo Merchan, S Gehrer, S Jain, ... US Patent 20,210,194,921, 2021 | 4* | 2021 |
Securing 5G Slices using Homomorphic Encryption E Kline, S Ravi, D Cousins, S Rv 2022 IEEE Wireless Communications and Networking Conference (WCNC), 43-48, 2022 | 3 | 2022 |
HRA-Secure Homomorphic Lattice-Based Proxy Re-Encryption with Tight Security A Cohen, DB Cousins, N Genise, E Kline, Y Polyakov, RV Saraswathy Cryptology ePrint Archive, 2024 | | 2024 |
SYSTEM AND METHOD FOR DISTRIBUTED LAPLACE NOISE GENERATION FOR DIFFERENTIAL PRIVACY SR Vancheeswaran, JG Merchan US Patent App. 20,230/315,868, 2023 | | 2023 |
Building blocks for Threshold FHE A Alexandru, A Al Badawi, N Genise, D Micciancio, Y Polyakov, ... | | |
Compilation of Public Comments on NISTIR 8214C ipd FA Thompson, FS Ranellucci, FF Sudia, FJ Miller, J van de Pol, ... | | |