Project Details
| Acronym | - |
|---|---|
| Status | Active |
| Effective start/end date | 01/01/2024 → 31/12/2026 |
Fingerprint
Explore the research topics touched on by this project. These labels are generated based on the underlying awards/grants. Together they form a unique fingerprint.
Research output
- 4 Conference article in proceedings
-
Pilvi : Lattice Threshold PKE with Small Decryption Shares and Improved Security
Cini, V., Lai, R. W. F. & Woo, I. K. Y., 2026, Advances in Cryptology - ASIACRYPT 2025 - 31st International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Hanaoka, G. & Yang, B.-Y. (eds.). Springer, Vol. 6. p. 539-569 31 p. (Lecture Notes in Computer Science; vol. 16250 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference article in proceedings › Scientific › peer-review
Open Access -
RoK and Roll – Verifier-Efficient Random Projection for O~(λ)-Size Lattice Arguments
Klooß, M., Lai, R. W. F., Nguyen, N. K. & Osadnik, M., 2026, Advances in Cryptology - ASIACRYPT 2025 - 31st International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Hanaoka, G. & Yang, B.-Y. (eds.). Springer, Vol. 3. p. 297-329 33 p. (Lecture Notes in Computer Science; vol. 16247 ).Research output: Chapter in Book/Report/Conference proceeding › Conference article in proceedings › Scientific › peer-review
Open Access -
Hollow LWE : A New Spin: Unbounded Updatable Encryption from LWE and PCE
Albrecht, M. R., Benčina, B. & Lai, R. W. F., 2025, Advances in Cryptology – EUROCRYPT 2025 - 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2025, Proceedings. Fehr, S. & Fouque, P.-A. (eds.). Springer, p. 363-392 30 p. (Lecture Notes in Computer Science; vol. 15608 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference article in proceedings › Scientific › peer-review
Open Access