Ring learning with errors

Results: 8



#Item
1

Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos1 , Craig Costello2 , Michael Naehrig2 , and Douglas Stebila3,∗ 1 2 3

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2016-10-26 21:12:51
    2Algebraic number theory / Finite fields / Ring Learning with Errors / Galois theory / Field theory / Algebraic number field / Distribution / Frobenius endomorphism / XTR / Ring learning with errors key exchange

    Vulnerable Galois RLWE Families and Improved Attacks Hao Chen, Kristin E. Lauter, Katherine E. Stange 1. Introduction Lattice-based cryptography was introduced in the mid 1990s in two different forms, independently by Aj

    Add to Reading List

    Source URL: math.colorado.edu

    Language: English - Date: 2016-02-24 10:14:48
    3Quantum information science / Theoretical computer science / Quantum cryptography / Quantum computing / Cryptography / Quantum mechanics / Quantum algorithm / Quantum money / Quantum key distribution / Quantum information / Quantum entanglement / Ring learning with errors key exchange

    Quantum Money from Hidden Subspaces

    Add to Reading List

    Source URL: theoryofcomputing.org

    Language: English - Date: 2014-11-14 13:01:23
    4

    Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Douglas Stebila Queensland University of Technology joint work with Joppe Bos (NXP),

    Add to Reading List

    Source URL: files.douglas.stebila.ca

    Language: English - Date: 2015-01-08 11:24:26
      5Secure communication / Electronic commerce / Learning with errors / NTRU / Transport Layer Security / Cipher suite / Elliptic curve cryptography / Quantum computer / RSA / Cryptography / Cryptographic protocols / Internet protocols

      Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos1 , Craig Costello2 , Michael Naehrig2 , and Douglas Stebila3,∗ 1 2 3

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-04-09 11:27:47
      6Learning with errors / Machine learning / Ciphertext indistinguishability / RSA / Cyberwarfare / Applied mathematics / Security / Cryptography / Public-key cryptography / Electronic commerce

      How Practical is Public-Key Encryption Based on LPN and Ring-LPN? Ivan Damg˚ ard1 and Sunoo Park2 1

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2014-04-21 15:54:23
      7Cryptography / Learning with errors / Machine learning / Polynomial / Multiplication / Modular arithmetic / RSA / Fast Fourier transform / Abstract algebra / Mathematics / Algebra

      Efficient Ring-LWE Encryption on 8-bit AVR Processors Zhe Liu1 , Hwajeong Seo2 , and Sujoy Sinha Roy3 , Johann Großsch¨adl1 , Howon Kim2 , Ingrid Verbauwhede3 1

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-05-02 00:52:44
      8Cyberwarfare / Applied mathematics / Finite fields / Homomorphic encryption / RSA / XTR / Learning with errors / Digital signature / Group signature / Cryptography / Public-key cryptography / Mathematics

      Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based San Ling, Khoa Nguyen, Huaxiong Wang Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-01-09 09:24:22
      UPDATE