Ring learning with errors

Results: 8



#Item
1Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos1 , Craig Costello2 , Michael Naehrig2 , and Douglas Stebila3,∗ 1 2 3

Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos1 , Craig Costello2 , Michael Naehrig2 , and Douglas Stebila3,∗ 1 2 3

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2016-10-26 21:12:51
    2Vulnerable Galois RLWE Families and Improved Attacks Hao Chen, Kristin E. Lauter, Katherine E. Stange 1. Introduction Lattice-based cryptography was introduced in the mid 1990s in two different forms, independently by Aj

    Vulnerable Galois RLWE Families and Improved Attacks Hao Chen, Kristin E. Lauter, Katherine E. Stange 1. Introduction Lattice-based cryptography was introduced in the mid 1990s in two different forms, independently by Aj

    Add to Reading List

    Source URL: math.colorado.edu

    Language: English - Date: 2016-02-24 10:14:48
    3Quantum Money from Hidden Subspaces

    Quantum Money from Hidden Subspaces

    Add to Reading List

    Source URL: theoryofcomputing.org

    Language: English - Date: 2014-11-14 13:01:23
    4Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Douglas Stebila Queensland University of Technology joint work with Joppe Bos (NXP),

    Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Douglas Stebila Queensland University of Technology joint work with Joppe Bos (NXP),

    Add to Reading List

    Source URL: files.douglas.stebila.ca

    Language: English - Date: 2015-01-08 11:24:26
      5Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos1 , Craig Costello2 , Michael Naehrig2 , and Douglas Stebila3,∗ 1 2 3

      Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos1 , Craig Costello2 , Michael Naehrig2 , and Douglas Stebila3,∗ 1 2 3

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-04-09 11:27:47
      6How Practical is Public-Key Encryption Based on LPN and Ring-LPN? Ivan Damg˚ ard1 and Sunoo Park2 1

      How Practical is Public-Key Encryption Based on LPN and Ring-LPN? Ivan Damg˚ ard1 and Sunoo Park2 1

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2014-04-21 15:54:23
      7Efficient Ring-LWE Encryption on 8-bit AVR Processors Zhe Liu1 , Hwajeong Seo2 , and Sujoy Sinha Roy3 , Johann Großsch¨adl1 , Howon Kim2 , Ingrid Verbauwhede3 1

      Efficient Ring-LWE Encryption on 8-bit AVR Processors Zhe Liu1 , Hwajeong Seo2 , and Sujoy Sinha Roy3 , Johann Großsch¨adl1 , Howon Kim2 , Ingrid Verbauwhede3 1

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-05-02 00:52:44
      8Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based San Ling, Khoa Nguyen, Huaxiong Wang Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University

      Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based San Ling, Khoa Nguyen, Huaxiong Wang Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-01-09 09:24:22