Lattice-based cryptography

Results: 79



#Item
51IS2: Guidelines for Authors

IS2: Guidelines for Authors

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2008-06-09 08:32:09
52NEWS  MAR[removed]No[removed]

NEWS MAR[removed]No[removed]

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2014-08-13 01:18:16
53Lattice-based Cryptography Oded Regev? Tel Aviv University, Israel Abstract. We describe some of the recent progress on lattice-based cryptography, starting from the seminal work of Ajtai, and ending with

Lattice-based Cryptography Oded Regev? Tel Aviv University, Israel Abstract. We describe some of the recent progress on lattice-based cryptography, starting from the seminal work of Ajtai, and ending with

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:55
54High Performance Lattice-based CCA-secure Encryption Rachid El Bansarkhani and Johannes Buchmann Technische Universität Darmstadt Fachbereich Informatik Kryptographie und Computeralgebra, Hochschulstraße 10, 64289 Darm

High Performance Lattice-based CCA-secure Encryption Rachid El Bansarkhani and Johannes Buchmann Technische Universität Darmstadt Fachbereich Informatik Kryptographie und Computeralgebra, Hochschulstraße 10, 64289 Darm

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-16 16:21:30
55Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms ? Binanda Sengupta and Abhijit Das Department of Computer Science and Engineering Indian Institute of Technology Kharagpur, West Beng

Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms ? Binanda Sengupta and Abhijit Das Department of Computer Science and Engineering Indian Institute of Technology Kharagpur, West Beng

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-20 08:14:47
56Lattice Enumeration using Extreme Pruning Nicolas Gama1 , Phong Q. Nguyen2 , and Oded Regev3 1 GREYC and ENSICAEN, France. INRIA and ENS, France. http://www.di.ens.fr/~pnguyen/.

Lattice Enumeration using Extreme Pruning Nicolas Gama1 , Phong Q. Nguyen2 , and Oded Regev3 1 GREYC and ENSICAEN, France. INRIA and ENS, France. http://www.di.ens.fr/~pnguyen/.

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-07-19 15:34:39
57Vinod Vaikuntanathan Curriculum Vitae Date of Revision:May 2, 2013 A BIOGRAPHICAL INFORMATION A.1

Vinod Vaikuntanathan Curriculum Vitae Date of Revision:May 2, 2013 A BIOGRAPHICAL INFORMATION A.1

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-05-02 00:24:31
58Functional Encryption for Inner Product Predicates from Learning with Errors Shweta Agrawal∗ University of California, Los Angeles [removed]

Functional Encryption for Inner Product Predicates from Learning with Errors Shweta Agrawal∗ University of California, Los Angeles [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-08-16 17:16:58
59Fast Lattice Point Enumeration with Minimal Overhead∗ Daniele Micciancio UCSD [removed]  Michael Walter

Fast Lattice Point Enumeration with Minimal Overhead∗ Daniele Micciancio UCSD [removed] Michael Walter

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-07 13:48:08