Workshop paperPrivacy-preserving record linkage using local sensitive hash and private set intersection
Conference paperTiming leakage analysis of non-constant-time NTT implementations with Harvey butterflies