First Page | Document Content | |
---|---|---|
Date: 2010-01-12 16:25:05Lattice Matrix Vector space Projection Determinant Basis Gram–Schmidt process Hermite normal form Ideal lattice cryptography Algebra Mathematics Linear algebra | CSE 206A: Lattice Algorithms and Applications Winter: Basic Algorithms Instructor:Add to Reading ListSource URL: cseweb.ucsd.eduDownload Document from Source WebsiteFile Size: 165,77 KBShare Document on Facebook |
Parallel Implementation of BDD enumeration for LWE Elena Kirshanova, Alexander May, Friedrich Wiemer Horst G¨ ortz Institute for IT-Security Faculty of MathematicsDocID: 1pJyl - View Document | |
Post-quantum key exchange – a new hope Erdem Alkim1 , Léo Ducas2 , Thomas Pöppelmann3 , and Peter Schwabe4 ? 1DocID: 1pFRC - View Document | |
Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes Massimo Chenal Qiang TangDocID: 1kQdy - View Document | |
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices Jonathan Katz1? and Vinod Vaikuntanathan2 1 University of MarylandDocID: 1gx7z - View Document |