Lattice-based cryptography

Results: 79



#Item
1Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Shi Bai1 , Tancrède Lepoint3 , Adeline Roux-Langlois4 , Amin Sakzad5 , Damien Stehlé2 , and Ron S

Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Shi Bai1 , Tancrède Lepoint3 , Adeline Roux-Langlois4 , Amin Sakzad5 , Damien Stehlé2 , and Ron S

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-02-25 03:26:11
2Some Recent Uses of Stern-like Protocols in Lattice-Based Cryptography Khoa Nguyen, Nanyang Technological University Quantum-Safe Crypto Workshop, CQT, NUS  October, 3rd, 2016

Some Recent Uses of Stern-like Protocols in Lattice-Based Cryptography Khoa Nguyen, Nanyang Technological University Quantum-Safe Crypto Workshop, CQT, NUS October, 3rd, 2016

Add to Reading List

Source URL: quantum-safe-crypto.quantumlah.org

- Date: 2016-10-04 03:16:29
    3Lattice-Based Cryptography in Java Advisor(s): Christian Hanser and Sebastian Ramacher Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

    Lattice-Based Cryptography in Java Advisor(s): Christian Hanser and Sebastian Ramacher Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

    Add to Reading List

    Source URL: www.iaik.tugraz.at

    - Date: 2015-09-08 06:00:03
      4¨ Bases) Interactions between Computer Algebra (Grobner and Cryptology  `

      ¨ Bases) Interactions between Computer Algebra (Grobner and Cryptology `

      Add to Reading List

      Source URL: issac2009.kias.re.kr

      Language: English - Date: 2009-07-28 12:02:47
      5Lattice Cryptography: A White Paper Daniele Micciancio∗ March 16, 2010 1

      Lattice Cryptography: A White Paper Daniele Micciancio∗ March 16, 2010 1

      Add to Reading List

      Source URL: thmatters.files.wordpress.com

      Language: English - Date: 2015-09-29 10:45:40
      6Post-quantum key exchange – a new hope Erdem Alkim1 , Léo Ducas2 , Thomas Pöppelmann3 , and Peter Schwabe4 ?  1

      Post-quantum key exchange – a new hope Erdem Alkim1 , Léo Ducas2 , Thomas Pöppelmann3 , and Peter Schwabe4 ? 1

      Add to Reading List

      Source URL: cryptojedi.org

      Language: English - Date: 2015-12-08 11:13:38
      7Submitted exclusively to the London Mathematical Society doi:Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key Christine van Vredendaal

      Submitted exclusively to the London Mathematical Society doi:Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key Christine van Vredendaal

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2016-02-22 01:46:08
      8Nearest lattice problem, diophantine approximation April 12, L´ aszl´ o Babai. On Lov´

      Nearest lattice problem, diophantine approximation April 12, L´ aszl´ o Babai. On Lov´

      Add to Reading List

      Source URL: people.cs.uchicago.edu

      Language: English - Date: 2014-04-12 03:21:07
      9Vulnerable Galois RLWE Families and Improved Attacks Hao Chen, Kristin E. Lauter, Katherine E. Stange 1. Introduction Lattice-based cryptography was introduced in the mid 1990s in two different forms, independently by Aj

      Vulnerable Galois RLWE Families and Improved Attacks Hao Chen, Kristin E. Lauter, Katherine E. Stange 1. Introduction Lattice-based cryptography was introduced in the mid 1990s in two different forms, independently by Aj

      Add to Reading List

      Source URL: math.colorado.edu

      Language: English - Date: 2016-02-24 10:14:48
      10Towards Quantum Resistant Cryptography Standards Dr. Markku-Juhani O. Saarinen Research Fellow, Queen’s University Belfast

      Towards Quantum Resistant Cryptography Standards Dr. Markku-Juhani O. Saarinen Research Fellow, Queen’s University Belfast

      Add to Reading List

      Source URL: ctcrypt.ru

      Language: English - Date: 2016-06-10 06:35:53