Lattice-based cryptography

Results: 79



#Item
31Session #5: Learning With Errors Chris Peikert Georgia Institute of Technology  Winter School on Lattice-Based Cryptography and Applications

Session #5: Learning With Errors Chris Peikert Georgia Institute of Technology Winter School on Lattice-Based Cryptography and Applications

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2015-09-08 16:32:02
    32Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices Jonathan Katz1? and Vinod Vaikuntanathan2 1  University of Maryland

    Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices Jonathan Katz1? and Vinod Vaikuntanathan2 1 University of Maryland

    Add to Reading List

    Source URL: www.cs.umd.edu

    Language: English - Date: 2009-09-07 10:57:44
    33Practical Lattice-based Digital Signature Schemes

    Practical Lattice-based Digital Signature Schemes

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-04-09 11:42:22
    34Cryptography from Post-Quantum Assumptions Raza Ali Kazmi Doctor of Philosophy

    Cryptography from Post-Quantum Assumptions Raza Ali Kazmi Doctor of Philosophy

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-04-18 18:23:29
    35

    PDF Document

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-04-02 10:56:48
    36Lattice-based Cryptography Daniele Micciancio∗ Oded Regev†  July 22, 2008

    Lattice-based Cryptography Daniele Micciancio∗ Oded Regev† July 22, 2008

    Add to Reading List

    Source URL: www.cims.nyu.edu

    Language: English - Date: 2008-07-22 12:40:02
    37A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol (Extended version of WEWORC paper, presented in July 2007, in Bochum, Germany) Carlos Aguilar-Melchor and Philippe Gaborit XLIM - Universit

    A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol (Extended version of WEWORC paper, presented in July 2007, in Bochum, Germany) Carlos Aguilar-Melchor and Philippe Gaborit XLIM - Universit

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2008-02-24 13:37:04
    38The Learning with Errors Problem Oded Regev∗ Abstract In this survey we describe the Learning with Errors (LWE) problem, discuss its properties, its hardness, and its cryptographic applications.

    The Learning with Errors Problem Oded Regev∗ Abstract In this survey we describe the Learning with Errors (LWE) problem, discuss its properties, its hardness, and its cryptographic applications.

    Add to Reading List

    Source URL: www.cims.nyu.edu

    Language: English - Date: 2010-06-01 03:43:39
    39Representing Hard Lattices with O(n log n) Bits  ∗ Mikl´ os Ajtai

    Representing Hard Lattices with O(n log n) Bits ∗ Mikl´ os Ajtai

    Add to Reading List

    Source URL: cjtcs.cs.uchicago.edu

    Language: English - Date: 2008-05-13 00:45:28
    40The nc-Unique Shortest Vector Problem is Hard Vadim Lyubashevsky∗ Abstract The unique Shortest Vector Problem (uSVP) gained prominence because it was the problem upon which the first provably-secure lattice-based crypt

    The nc-Unique Shortest Vector Problem is Hard Vadim Lyubashevsky∗ Abstract The unique Shortest Vector Problem (uSVP) gained prominence because it was the problem upon which the first provably-secure lattice-based crypt

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2008-12-01 09:32:36