Lattice-based cryptography

Results: 79



#Item
11Topics in Post-Quantum Cryptography Lattice-Based Methods Jesko H¨ uttenhain

Topics in Post-Quantum Cryptography Lattice-Based Methods Jesko H¨ uttenhain

Add to Reading List

Source URL: www.huettenhain.net

Language: English
    12Lattice Signatures and Bimodal Gaussians L´eo Ducas∗ and Alain Durmus∗∗ and Tancr`ede Lepoint† and Vadim Lyubashevsky‡ {Leo.Ducas, Alain.Durmus, Tancrede.Lepoint, Vadim.Lyubashevsky}@ens.fr Abstract. Our main

    Lattice Signatures and Bimodal Gaussians L´eo Ducas∗ and Alain Durmus∗∗ and Tancr`ede Lepoint† and Vadim Lyubashevsky‡ {Leo.Ducas, Alain.Durmus, Tancrede.Lepoint, Vadim.Lyubashevsky}@ens.fr Abstract. Our main

    Add to Reading List

    Source URL: www.di.ens.fr

    Language: English - Date: 2013-09-25 15:09:35
    13Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems Tim G¨ uneysu1∗ , Vadim Lyubashevsky2† , and Thomas P¨oppelmann1∗ 1

    Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems Tim G¨ uneysu1∗ , Vadim Lyubashevsky2† , and Thomas P¨oppelmann1∗ 1

    Add to Reading List

    Source URL: www.sha.rub.de

    Language: English - Date: 2014-06-12 05:54:41
      14Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Shi Bai1 , Adeline Langlois2 , Tancrède Lepoint3 , Damien Stehlé1 , Ron Steinfeld4 1

      Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Shi Bai1 , Adeline Langlois2 , Tancrède Lepoint3 , Damien Stehlé1 , Ron Steinfeld4 1

      Add to Reading List

      Source URL: perso.ens-lyon.fr

      Language: English - Date: 2015-06-15 17:19:13
        15Lattice Cryptography for the Internet Chris Peikert∗ July 16, 2014 Abstract In recent years, lattice-based cryptography has been recognized for its many attractive properties, such

        Lattice Cryptography for the Internet Chris Peikert∗ July 16, 2014 Abstract In recent years, lattice-based cryptography has been recognized for its many attractive properties, such

        Add to Reading List

        Source URL: web.eecs.umich.edu

        Language: English - Date: 2015-09-08 16:32:09
          16Lattice-Based Cryptography: Mathematical and Computational Background Chris Peikert Georgia Institute of Technology  crypt@b-it 2013

          Lattice-Based Cryptography: Mathematical and Computational Background Chris Peikert Georgia Institute of Technology crypt@b-it 2013

          Add to Reading List

          Source URL: web.eecs.umich.edu

          Language: English - Date: 2015-09-08 16:32:03
            17Lattice-Based Cryptography: Constructing Trapdoors and More Applications Chris Peikert Georgia Institute of Technology  crypt@b-it 2013

            Lattice-Based Cryptography: Constructing Trapdoors and More Applications Chris Peikert Georgia Institute of Technology crypt@b-it 2013

            Add to Reading List

            Source URL: web.eecs.umich.edu

            Language: English - Date: 2015-09-08 16:32:04
              18Session #9: Trapdoors and Applications Chris Peikert Georgia Institute of Technology  Winter School on Lattice-Based Cryptography and Applications

              Session #9: Trapdoors and Applications Chris Peikert Georgia Institute of Technology Winter School on Lattice-Based Cryptography and Applications

              Add to Reading List

              Source URL: web.eecs.umich.edu

              Language: English - Date: 2015-09-08 16:32:04
                19Some Recent Progress in Lattice-Based Cryptography Chris Peikert SRI  TCC 2009

                Some Recent Progress in Lattice-Based Cryptography Chris Peikert SRI TCC 2009

                Add to Reading List

                Source URL: web.eecs.umich.edu

                Language: English - Date: 2015-09-08 16:32:00
                  20Lattice-Based Cryptography: Ring-Based Primitives and Open Problems Chris Peikert Georgia Institute of Technology  crypt@b-it 2013

                  Lattice-Based Cryptography: Ring-Based Primitives and Open Problems Chris Peikert Georgia Institute of Technology crypt@b-it 2013

                  Add to Reading List

                  Source URL: web.eecs.umich.edu

                  Language: English - Date: 2015-09-08 16:32:01