William Whyte
Orcid: 0000-0002-2458-4149
According to our database1,
William Whyte
authored at least 37 papers
between 1995 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Soft robot-mediated autonomous adaptation to fibrotic capsule formation for improved drug delivery.
Sci. Robotics, August, 2023
2020
RFC, September, 2020
2019
Sci. Robotics, 2019
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
2018
IEEE Trans. Intell. Transp. Syst., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017
2016
Proc. Priv. Enhancing Technol., 2016
Proceedings of the International Conference on High Performance Computing & Simulation, 2016
2015
DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation - Preliminary Report.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the IEEE 18th International Conference on Intelligent Transportation Systems, 2015
2014
Proceedings of the Post-Quantum Cryptography - 6th International Workshop, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013
2011
2010
Proceedings of the LLL Algorithm - Survey and Applications, 2010
2009
Proceedings of the IEEE Vehicular Networking Conference, 2009
Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
2007
Proceedings of the Topics in Cryptology, 2007
2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
2004
Modified Parameter Attacks: Practical Attacks against CCA2 Secure Cryptosystems and Countermeasures.
IACR Cryptol. ePrint Arch., 2004
2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Topics in Cryptology, 2003
Proceedings of the Advances in Cryptology, 2003
1995