Lattice-based cryptography

Results: 79



#Item
41Lattice points / Cryptography / Computational number theory / Linear algebra / Quadratic forms / Lattice problem / Lattice reduction / Lattice / Lenstra–Lenstra–Lovász lattice basis reduction algorithm / Algebra / Mathematics / Abstract algebra

A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-Sparse Representations of Short Lattice Vectors ? ?? Dan Ding1 , Guizhen Zhu2 , Yang Yu1 , Zhongxiang Zheng1 1 Department of Computer Science and Tech

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-04 01:20:06
42Cyberwarfare / Applied mathematics / Lattice-based cryptography / Lattice / RSA / Ciphertext indistinguishability / Ideal lattice cryptography / Cryptography / Mathematics / Learning with errors

Better Key Sizes (and Attacks) for LWE-Based Encryption Richard Lindner∗ Chris Peikert†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-11-30 13:28:50
43Lattice problem / Learning with errors / Lattice / Public-key cryptography / Cipher / Symmetric-key algorithm / Semantic security / GGH encryption scheme / Ideal lattice cryptography / Cryptography / Lattice-based cryptography / Homomorphic encryption

Attribute-Based Functional Encryption on Lattices (Extended Abstract) Xavier Boyen December 31, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-31 10:07:10
44NTRUSign / Lattice-based cryptography / NTRU / Lattice problem / RSA / Lattice / Digital signature / Learning with errors / Ideal lattice cryptography / Cryptography / Post-quantum cryptography / Public-key cryptography

Practical Lattice-based Digital Signature Schemes NIST Workshop on Cybersecurity in a Post-Quantum World J. Howe, T. Pöppelmann, M. O’Neill, E. O’Sullivan, T. Güneysu, V. Lyubashevsky

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 13:38:18
45Electronic commerce / RSA / Key / Cryptanalysis / Cryptography / Public-key cryptography / Key management

Exploiting Poor Randomness: Lattice-Based Techniques Nadia Heninger University of Pennsylvania October 16, 2014

Add to Reading List

Source URL: attackschool.di.uminho.pt

Language: English - Date: 2014-11-03 05:59:17
46Lattice theory / Lattice-based access control / Role-based access control / Mihir Bellare / National Security Agency / Principal investigator / Public-key cryptography / PERMIS / Cryptography / Computer security / Security

Professor Ravi Sandhu University of Texas at San Antonio Executive Director and Founder, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security Professor of Computer Science, College of Sciences www.p

Add to Reading List

Source URL: www.profsandhu.com

Language: English - Date: 2013-10-09 14:40:49
47Abstract algebra / Vectors / Cryptography / Information theory / Network coding / Linear combination / Linear span / Vector space / Digital signature / Algebra / Mathematics / Linear algebra

Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures Dan Boneh and David Mandell Freeman Stanford University, USA

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2011-04-01 18:52:46
48ID-based encryption / Ciphertext / Lattice / Ideal lattice cryptography / Rabin cryptosystem / Cryptography / RSA / Learning with errors

Functional Encryption for Inner Product Predicates from Learning with Errors Shweta Agrawal∗ University of California, Los Angeles, USA [removed]

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2011-09-02 00:42:27
49Outline of cryptography / Side channel attack / Edward Felten / Cryptanalysis / International Cryptology Conference / Cryptographic engineering / Elliptic curve cryptography / Cryptography / Lattice-based cryptography / Pwnie Awards

Nadia Heninger +[removed]Computer & Information Science Department University of Pennsylvania 3330 Walnut St. Philadelphia, PA[removed]

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-02-25 14:14:07
50RSA / Finite fields / Elliptic Curve DSA / Diffie–Hellman key exchange / Digital signature / Digital Signature Algorithm / SHA-1 / Subliminal channels / ElGamal signature scheme / Cryptography / Public-key cryptography / Electronic commerce

Lattice-based Fault Attacks on DSA - Another Possible Strategy

Add to Reading List

Source URL: crypto.hyperlink.cz

Language: English - Date: 2005-08-29 10:42:00
UPDATE