<--- Back to Details
First PageDocument Content
Cryptography / Post-quantum cryptography / Lattice-based cryptography / Public-key cryptography / Key management / Homomorphic encryption / NTRU / Lattice problem / SWIFFT / Cryptographic hash function / Key / Lattice
Date: 2015-09-29 10:45:40
Cryptography
Post-quantum cryptography
Lattice-based cryptography
Public-key cryptography
Key management
Homomorphic encryption
NTRU
Lattice problem
SWIFFT
Cryptographic hash function
Key
Lattice

Lattice Cryptography: A White Paper Daniele Micciancio∗ March 16, 2010 1

Add to Reading List

Source URL: thmatters.files.wordpress.com

Download Document from Source Website

File Size: 69,73 KB

Share Document on Facebook

Similar Documents

Characterizing overstretched NTRU attacks Gabrielle De Micheli, Nadia Heninger and Barak Shani University of Pennsylvania Abstract Overstretched NTRU, an NTRU variant with a large modulus, has been used as a building

Characterizing overstretched NTRU attacks Gabrielle De Micheli, Nadia Heninger and Barak Shani University of Pennsylvania Abstract Overstretched NTRU, an NTRU variant with a large modulus, has been used as a building

DocID: 1xTAG - View Document

NTRU Prime: reducing attack surface at low cost Daniel J. Bernstein1 , Chitchanok Chuengsatiansup2 , Tanja Lange3 , and Christine van Vredendaal3 1

NTRU Prime: reducing attack surface at low cost Daniel J. Bernstein1 , Chitchanok Chuengsatiansup2 , Tanja Lange3 , and Christine van Vredendaal3 1

DocID: 1viGI - View Document

NTRU Prime Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, and Christine van Vredendaal Technische Universiteit Eindhoven  25 August 2016

NTRU Prime Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, and Christine van Vredendaal Technische Universiteit Eindhoven 25 August 2016

DocID: 1vfuq - View Document

A Scalable Implementation of Fully Homomorphic Encryption Built on NTRU∗ Kurt Rohloff David Bruce Cousins Raytheon BBN Technologies 10 Moulton St.

A Scalable Implementation of Fully Homomorphic Encryption Built on NTRU∗ Kurt Rohloff David Bruce Cousins Raytheon BBN Technologies 10 Moulton St.

DocID: 1u1LL - View Document

A subfield lattice attack on overstretched NTRU assumptions Cryptanalysis of some FHE and Graded Encoding Schemes Martin Albrecht1? , Shi Bai2?? , and L´eo Ducas3? ? ? 1

A subfield lattice attack on overstretched NTRU assumptions Cryptanalysis of some FHE and Graded Encoding Schemes Martin Albrecht1? , Shi Bai2?? , and L´eo Ducas3? ? ? 1

DocID: 1t0yC - View Document