IACR

Results: 2241



#Item
391

Lattice Signatures and Bimodal Gaussians L´eo Ducas∗ and Alain Durmus∗∗ and Tancr`ede Lepoint† and Vadim Lyubashevsky‡ {Leo.Ducas, Alain.Durmus, Tancrede.Lepoint, Vadim.Lyubashevsky}@ens.fr Abstract. Our main

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2013-12-10 11:44:27
    392

    How to Backdoor Diffie-Hellman David Wong NCC Group, June

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2016-06-21 22:14:14
      393

      One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner. Ethan Heilman Boston University

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2014-04-04 11:11:31
        394

        Noname manuscript No. (will be inserted by the editor) Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2015-04-24 16:50:14
          395

          A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol (Extended version of WEWORC paper, presented in July 2007, in Bochum, Germany) Carlos Aguilar-Melchor and Philippe Gaborit XLIM - Universit

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2008-02-24 13:37:04
            396

            Simultaneous Secrecy and Reliability Amplification for a General Channel Model Russell Impagliazzo1 , Ragesh Jaiswal2 , Valentine Kabanets3 , Bruce M. Kapron4 , Valerie King4 , and Stefano Tessaro5 1

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2016-08-05 20:17:42
              397

              Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos1 , Craig Costello2 , Michael Naehrig2 , and Douglas Stebila3,∗ 1 2 3

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2016-10-26 21:12:51
                398

                A subfield lattice attack on overstretched NTRU assumptions Cryptanalysis of some FHE and Graded Encoding Schemes Martin Albrecht1? , Shi Bai2?? , and L´eo Ducas3? ? ? 1

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2016-07-04 10:02:28
                  399

                  Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes Joseph A. Akinyele∗ Johns Hopkins University

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2015-08-13 16:00:47
                    UPDATE