Lattice-based cryptography

Results: 79



#Item
21Lattice-Based Cryptography: Short Integer Solution (SIS) and Learning With Errors (LWE) Chris Peikert Georgia Institute of Technology

Lattice-Based Cryptography: Short Integer Solution (SIS) and Learning With Errors (LWE) Chris Peikert Georgia Institute of Technology

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2015-09-08 16:32:02
    22Low-Cost and Area-Efficient FPGA Implementations of Lattice-Based Cryptography Aydin Aysu, Cameron Patterson and Patrick Schaumont Electrical and Computer Engineering Department Virginia Tech Blacksburg, VA, USA

    Low-Cost and Area-Efficient FPGA Implementations of Lattice-Based Cryptography Aydin Aysu, Cameron Patterson and Patrick Schaumont Electrical and Computer Engineering Department Virginia Tech Blacksburg, VA, USA

    Add to Reading List

    Source URL: rijndael.ece.vt.edu

    Language: English - Date: 2013-06-05 16:33:11
      23Peculiar Properties of Lattice-Based Encryption Chris Peikert Georgia Institute of Technology  Public Key Cryptography

      Peculiar Properties of Lattice-Based Encryption Chris Peikert Georgia Institute of Technology Public Key Cryptography

      Add to Reading List

      Source URL: web.eecs.umich.edu

      Language: English - Date: 2015-09-08 16:32:09
        24Lattice-Based Cryptography: Trapdoors, Discrete Gaussians, and Applications Chris Peikert Georgia Institute of Technology  crypt@b-it 2013

        Lattice-Based Cryptography: Trapdoors, Discrete Gaussians, and Applications Chris Peikert Georgia Institute of Technology crypt@b-it 2013

        Add to Reading List

        Source URL: web.eecs.umich.edu

        Language: English - Date: 2015-09-08 16:31:59
          25UNIVERSITY OF CALIFORNIA, SAN DIEGO  Towards Practical Lattice-Based Cryptography A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy

          UNIVERSITY OF CALIFORNIA, SAN DIEGO Towards Practical Lattice-Based Cryptography A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy

          Add to Reading List

          Source URL: www.di.ens.fr

          Language: English - Date: 2012-10-31 08:48:37
            26Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes Massimo Chenal Qiang Tang

            Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes Massimo Chenal Qiang Tang

            Add to Reading List

            Source URL: isc2015.item.ntnu.no

            Language: English - Date: 2015-09-20 14:16:36
            27Session #10: (More) Trapdoors and Applications Chris Peikert Georgia Institute of Technology  Winter School on Lattice-Based Cryptography and Applications

            Session #10: (More) Trapdoors and Applications Chris Peikert Georgia Institute of Technology Winter School on Lattice-Based Cryptography and Applications

            Add to Reading List

            Source URL: web.eecs.umich.edu

            Language: English - Date: 2015-09-08 16:32:00
              28Lattice Based Cryptography for Beginners – A supplementary note to the following 1. Peikert’s Bonn Lecture Slides 2. Lyubashevsky, Peikert and Regev: A toolkit for Ring-LWE 3. Steinfeld’s Lecture Slides on multilin

              Lattice Based Cryptography for Beginners – A supplementary note to the following 1. Peikert’s Bonn Lecture Slides 2. Lyubashevsky, Peikert and Regev: A toolkit for Ring-LWE 3. Steinfeld’s Lecture Slides on multilin

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2015-12-20 21:43:09
                29Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware Thomas P¨oppelmann and Tim G¨ uneysu∗ Horst G¨ ortz Institute for IT-Security, Ruhr-University Bochum, Germany

                Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware Thomas P¨oppelmann and Tim G¨ uneysu∗ Horst G¨ ortz Institute for IT-Security, Ruhr-University Bochum, Germany

                Add to Reading List

                Source URL: www.sha.rub.de

                Language: English - Date: 2012-07-24 09:24:23