Lattice-based cryptography

Results: 79



#Item
41A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-Sparse Representations of Short Lattice Vectors ? ?? Dan Ding1 , Guizhen Zhu2 , Yang Yu1 , Zhongxiang Zheng1 1  Department of Computer Science and Tech

A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-Sparse Representations of Short Lattice Vectors ? ?? Dan Ding1 , Guizhen Zhu2 , Yang Yu1 , Zhongxiang Zheng1 1 Department of Computer Science and Tech

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-04 01:20:06
42Better Key Sizes (and Attacks) for LWE-Based Encryption Richard Lindner∗ Chris Peikert†

Better Key Sizes (and Attacks) for LWE-Based Encryption Richard Lindner∗ Chris Peikert†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-11-30 13:28:50
43Attribute-Based Functional Encryption on Lattices (Extended Abstract) Xavier Boyen December 31, 2012

Attribute-Based Functional Encryption on Lattices (Extended Abstract) Xavier Boyen December 31, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-31 10:07:10
44Practical Lattice-based Digital Signature Schemes NIST Workshop on Cybersecurity in a Post-Quantum World J. Howe, T. Pöppelmann, M. O’Neill, E. O’Sullivan, T. Güneysu, V. Lyubashevsky

Practical Lattice-based Digital Signature Schemes NIST Workshop on Cybersecurity in a Post-Quantum World J. Howe, T. Pöppelmann, M. O’Neill, E. O’Sullivan, T. Güneysu, V. Lyubashevsky

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 13:38:18
45Exploiting Poor Randomness: Lattice-Based Techniques Nadia Heninger University of Pennsylvania  October 16, 2014

Exploiting Poor Randomness: Lattice-Based Techniques Nadia Heninger University of Pennsylvania October 16, 2014

Add to Reading List

Source URL: attackschool.di.uminho.pt

Language: English - Date: 2014-11-03 05:59:17
46Professor Ravi Sandhu University of Texas at San Antonio Executive Director and Founder, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security Professor of Computer Science, College of Sciences www.p

Professor Ravi Sandhu University of Texas at San Antonio Executive Director and Founder, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security Professor of Computer Science, College of Sciences www.p

Add to Reading List

Source URL: www.profsandhu.com

Language: English - Date: 2013-10-09 14:40:49
47Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures Dan Boneh and David Mandell Freeman Stanford University, USA

Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures Dan Boneh and David Mandell Freeman Stanford University, USA

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2011-04-01 18:52:46
48Functional Encryption for Inner Product Predicates from Learning with Errors Shweta Agrawal∗ University of California, Los Angeles, USA [removed]

Functional Encryption for Inner Product Predicates from Learning with Errors Shweta Agrawal∗ University of California, Los Angeles, USA [removed]

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2011-09-02 00:42:27
49Nadia Heninger +[removed]Computer & Information Science Department University of Pennsylvania 3330 Walnut St. Philadelphia, PA[removed]

Nadia Heninger +[removed]Computer & Information Science Department University of Pennsylvania 3330 Walnut St. Philadelphia, PA[removed]

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-02-25 14:14:07
50Lattice-based Fault Attacks on DSA - Another Possible Strategy

Lattice-based Fault Attacks on DSA - Another Possible Strategy

Add to Reading List

Source URL: crypto.hyperlink.cz

Language: English - Date: 2005-08-29 10:42:00