Learning with errors

Results: 81



#Item
1An improved compression technique for signatures based on learning with errors Shi Bai and Steven D. Galbraith Department of Mathematics, University of Auckland, New Zealand.

An improved compression technique for signatures based on learning with errors Shi Bai and Steven D. Galbraith Department of Mathematics, University of Auckland, New Zealand.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-01-22 16:26:55
2Practical post-quantum key exchange from the Learning with Errors Problem

Practical post-quantum key exchange from the Learning with Errors Problem

Add to Reading List

Source URL: rwc.iacr.org

Language: English - Date: 2018-01-13 06:28:10
3Quantum computers and factoring Learning with errors Cryptography from LWE From linear algebra to post-quantum cryptography

Quantum computers and factoring Learning with errors Cryptography from LWE From linear algebra to post-quantum cryptography

Add to Reading List

Source URL: pqcrypto.eu.org

Language: English - Date: 2016-11-21 18:19:16
    4FrodoKEM Learning With Errors Key Encapsulation Algorithm Specifications And Supporting Documentation November 30,

    FrodoKEM Learning With Errors Key Encapsulation Algorithm Specifications And Supporting Documentation November 30,

    Add to Reading List

    Source URL: frodokem.org

    - Date: 2017-12-17 17:28:41
      5Interpolating Predicate and Functional Encryption from Learning With Errors Shweta Agrawal ∗

      Interpolating Predicate and Functional Encryption from Learning With Errors Shweta Agrawal ∗

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2016-09-22 05:13:43
        6Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos1 , Craig Costello2 , Michael Naehrig2 , and Douglas Stebila3,∗ 1 2 3

        Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos1 , Craig Costello2 , Michael Naehrig2 , and Douglas Stebila3,∗ 1 2 3

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2016-10-26 21:12:51
          7On Ideal Lattices and Learning with Errors Over Rings∗ Vadim Lyubashevsky† Chris Peikert‡

          On Ideal Lattices and Learning with Errors Over Rings∗ Vadim Lyubashevsky† Chris Peikert‡

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2013-06-25 20:43:36
            8Parallel Implementation of BDD enumeration for LWE Elena Kirshanova, Alexander May, Friedrich Wiemer Horst G¨ ortz Institute for IT-Security Faculty of Mathematics

            Parallel Implementation of BDD enumeration for LWE Elena Kirshanova, Alexander May, Friedrich Wiemer Horst G¨ ortz Institute for IT-Security Faculty of Mathematics

            Add to Reading List

            Source URL: www.cits.rub.de

            Language: English - Date: 2016-06-24 05:04:33
            9Post-quantum key exchange – a new hope Erdem Alkim1 , Léo Ducas2 , Thomas Pöppelmann3 , and Peter Schwabe4 ?  1

            Post-quantum key exchange – a new hope Erdem Alkim1 , Léo Ducas2 , Thomas Pöppelmann3 , and Peter Schwabe4 ? 1

            Add to Reading List

            Source URL: cryptojedi.org

            Language: English - Date: 2015-12-08 11:13:38
            10FHE Circuit Privacy Almost For Free Florian Bourse∗ , Rafa¨el Del Pino† , Michele Minelli‡ , and Hoeteck Wee§ ENS, CNRS, INRIA, and PSL Research University, Paris, France {fbourse,delpino,minelli,wee}@di.ens.fr

            FHE Circuit Privacy Almost For Free Florian Bourse∗ , Rafa¨el Del Pino† , Michele Minelli‡ , and Hoeteck Wee§ ENS, CNRS, INRIA, and PSL Research University, Paris, France {fbourse,delpino,minelli,wee}@di.ens.fr

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2016-06-13 09:13:32