Learning with errors

Results: 81



#Item
51ID-based encryption / Ciphertext / Lattice / Ideal lattice cryptography / Rabin cryptosystem / Cryptography / RSA / Learning with errors

Functional Encryption for Inner Product Predicates from Learning with Errors Shweta Agrawal∗ University of California, Los Angeles, USA [removed]

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2011-09-02 00:42:27
52Monoid / Cipher / Learning with errors / Transposition cipher / Mathematical sciences / Stream cipher / Classical cipher / Symmetric-key algorithm / Cryptography / Mathematics / Algebra

Sage Reference Manual: Cryptography Release 6.6.beta0 The Sage Development Team February 21, 2015

Add to Reading List

Source URL: sagemath.org

Language: English - Date: 2015-02-21 07:35:22
53Cryptography / Computational complexity theory / Information theory / Models of computation / Learning with errors / Lattice problem / Quantum computer / PP / Low / Theoretical computer science / Applied mathematics / Mathematics

Solving LWE problem with bounded errors in polynomial time Jintai Ding1,2 Southern Chinese University of Technology, 1 University of Cincinnati, 2 [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-11-02 07:13:56
54Lattice points / Computational number theory / Abstract algebra / Lattice problem / Lattice reduction / Lenstra–Lenstra–Lovász lattice basis reduction algorithm / Learning with errors / Lattice / Projection / Mathematics / Cryptography / Algebra

On the concrete hardness of Learning with Errors Martin R. Albrecht1 , Rachel Player1 , and Sam Scott1 Information Security Group, Royal Holloway, University of London Abstract. The Learning with Errors (LWE) problem has

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-19 12:06:15
55Learning with errors / Machine learning / Diffie–Hellman key exchange / Transport Layer Security / XTR / Transmission Control Protocol / Onion routing / RSA / Cryptography / Cryptographic protocols / Electronic commerce

Post-Quantum Secure Onion Routing (Future Anonymity in Today’s Budget) Satrajit Ghosh† † Aniket Kate‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-06 03:15:24
56Ciphertext / RSA / Learning with errors / Probabilistic encryption / Four-square cipher / Cryptography / Homomorphic encryption / Ciphertext indistinguishability

Predicate Encryption for Circuits from LWE Sergey Gorbunov∗ MIT Vinod Vaikuntanathan† MIT

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-13 11:54:01
57Learning with errors / Machine learning / Mathematics / RSA / Euclidean algorithm / Applied mathematics / Ideal lattice cryptography / Cryptography / Public-key cryptography / Electronic commerce

High Performance Lattice-based CCA-secure Encryption Rachid El Bansarkhani and Johannes Buchmann Technische Universität Darmstadt Fachbereich Informatik Kryptographie und Computeralgebra, Hochschulstraße 10, 64289 Darm

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-16 16:21:30
58Applied mathematics / Learning with errors / Public-key cryptography / Cipher / Mathematics / Technology / Cryptography / Ciphertext indistinguishability / RSA

Full version of an extended abstract published in Proceedings of PKC 2013, Springer-Verlag, 2013. Available from the IACR Cryptology ePrint Archive as Report[removed]Verifiable Elections That Scale for Free Melissa Cha

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:47:58
59Lattice / NTRUSign / Learning with errors / Trapdoor function / Gaussian function / Public-key cryptography / Ideal lattice cryptography / Leech lattice / Cryptography / Mathematics / Post-quantum cryptography

How to Use a Short Basis: Trapdoors for Hard Lattices and New Cryptographic Constructions Craig Gentry∗ Stanford University [removed]

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2009-08-17 12:04:32
60XTR / Mathematics / Cryptography / Learning with errors / Machine learning

Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification∗ Nico D¨ottling†‡ Dept. of Computer Science, Aarhus University January 12, 2015

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-12 05:14:03
UPDATE