First Page | Document Content | |
---|---|---|
![]() Date: 2009-08-17 12:04:23Cryptography Lie groups Analytic geometry Lattice Vector space Normal distribution Ideal lattice cryptography Inverse Galois problem Algebra Abstract algebra Mathematics | Source URL: www.cc.gatech.eduDownload Document from Source WebsiteFile Size: 284,96 KBShare Document on Facebook |
![]() | Parallel Implementation of BDD enumeration for LWE Elena Kirshanova, Alexander May, Friedrich Wiemer Horst G¨ ortz Institute for IT-Security Faculty of MathematicsDocID: 1pJyl - View Document |
![]() | Post-quantum key exchange – a new hope Erdem Alkim1 , Léo Ducas2 , Thomas Pöppelmann3 , and Peter Schwabe4 ? 1DocID: 1pFRC - View Document |
![]() | Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes Massimo Chenal Qiang TangDocID: 1kQdy - View Document |
![]() | Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices Jonathan Katz1? and Vinod Vaikuntanathan2 1 University of MarylandDocID: 1gx7z - View Document |