Back to Results
First PageMeta Content
Learning with errors / Machine learning / Ciphertext indistinguishability / RSA / Cyberwarfare / Applied mathematics / Security / Cryptography / Public-key cryptography / Electronic commerce


How Practical is Public-Key Encryption Based on LPN and Ring-LPN? Ivan Damg˚ ard1 and Sunoo Park2 1
Add to Reading List

Document Date: 2014-04-21 15:54:23


Open Document

File Size: 352,18 KB

Share Result on Facebook

Company

Bernstein / /

Facility

Aarhus University / /

IndustryTerm

simpler decryption algorithm / reduction algorithm / above algorithms / variant algorithm / noisy inner products / course search / above algorithm / probabilistic algorithm / search version / cryptographic applications / search variants / exhaustive search / /

Organization

Aarhus University / MIT / /

Person

Ivan Damg / /

Position

practical CPA / /

ProgrammingLanguage

R / /

Technology

Encryption / BKW algorithm / above algorithms / above algorithm / cryptography / secret key / public key / reduction algorithm / even simpler decryption algorithm / public-key encryption / probabilistic algorithm / variant algorithm / /

SocialTag