<--- Back to Details
First PageDocument Content
Ring / Specific Area Message Encoding / Computing / Computer security / Security / FIPS 140-2
Date: 2011-10-31 12:01:45
Ring
Specific Area Message Encoding
Computing
Computer security
Security
FIPS 140-2

Microsoft PowerPoint - Killmann_Applying the ADV Class to HW.ppt

Add to Reading List

Source URL: www.commoncriteriaportal.org

Download Document from Source Website

File Size: 267,68 KB

Share Document on Facebook

Similar Documents

Algebra / Abstract algebra / Mathematics / Commutative algebra / Lattice-based cryptography / Post-quantum cryptography / Cryptography / Field theory / Ring learning with errors / Ring learning with errors key exchange / Ring learning with errors signature

On the Ring-LWE and Polynomial-LWE Problems Miruna Rosca1,2 , Damien Stehlé1 , and Alexandre Wallet1 1 ENS de Lyon, Laboratoire LIP (U. Lyon, CNRS, ENSL, INRIA, UCBL), France

DocID: 1xVxG - View Document

Wheel + Ring = Reel: the Impact of Route Filtering on the Stability of Policy Routing Luca Cittadini Giuseppe Di Battista

DocID: 1xVsm - View Document

Cryptography / Post-quantum cryptography / Lattice-based cryptography / Computational hardness assumptions / Lie groups / Ring learning with errors / Learning with errors / Lattice / Homomorphic encryption / Order / Entropy / Ring learning with errors key exchange

Order-LWE and the Hardness of Ring-LWE with Entropic Secrets Zvika Brakerski Renen Perlman Weizmann Institute of Science∗ Abstract

DocID: 1xUGh - View Document

Cryptography / Post-quantum cryptography / Lattice-based cryptography / Ring learning with errors / Learning with errors / Obfuscation / Lattice

Obfuscating Conjunctions under Entropic Ring LWE∗ Zvika Brakerski† Weizmann Vinod Vaikuntanathan‡ MIT

DocID: 1xUpK - View Document

Cryptography / Public-key cryptography / Digital signature / IP / Soundness / Group signature / Post-quantum cryptography / Designated verifier signature / Computational complexity theory

Short  Accountable  Ring   Signatures Based  on  DDH Jonathan  Bootle,  Andrea  Cerulli,  Pyrros Chaidos,  Essam Ghadafi,   Jens  Groth,  and  Christophe  Petit  

DocID: 1xU3N - View Document