Conference paperTiming leakage analysis of non-constant-time NTT implementations with Harvey butterflies
Workshop paperPrivacy-preserving record linkage using local sensitive hash and private set intersection