Ideal lattice cryptography

Results: 53



#Item
11Representing Hard Lattices with O(n log n) Bits  ∗ Mikl´ os Ajtai

Representing Hard Lattices with O(n log n) Bits ∗ Mikl´ os Ajtai

Add to Reading List

Source URL: cjtcs.cs.uchicago.edu

Language: English - Date: 2008-05-13 00:45:28
12Representing Hard Lattices with O(n log n) Bits

Representing Hard Lattices with O(n log n) Bits

Add to Reading List

Source URL: cjtcs.cs.uchicago.edu

Language: English - Date: 2011-07-07 17:35:51
13Cryptanalysis of the Co-ACD Assumption Pierre-Alain Fouque1 , Moon Sung Lee2 , Tancr`ede Lepoint3 , and Mehdi Tibouchi4 1 Universit´e de Rennes 1 and Institut Universitaire de France,  2

Cryptanalysis of the Co-ACD Assumption Pierre-Alain Fouque1 , Moon Sung Lee2 , Tancr`ede Lepoint3 , and Mehdi Tibouchi4 1 Universit´e de Rennes 1 and Institut Universitaire de France, 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-12 19:26:06
14Lattice Decoding Attacks on Binary LWE Shi Bai and Steven D. Galbraith Department of Mathematics, University of Auckland, New Zealand.

Lattice Decoding Attacks on Binary LWE Shi Bai and Steven D. Galbraith Department of Mathematics, University of Auckland, New Zealand.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-04-24 04:32:29
15Compact Accumulator using Lattices Mahabir Prasad Jhanwar Reihaneh Safavi-Naini  R. C. Bose Center for Cryptology and Security

Compact Accumulator using Lattices Mahabir Prasad Jhanwar Reihaneh Safavi-Naini R. C. Bose Center for Cryptology and Security

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-26 03:53:17
16Generating Shorter Bases for Hard Random Lattices Jo¨el Alwen∗ New York University Chris Peikert † Georgia Institute of Technology

Generating Shorter Bases for Hard Random Lattices Jo¨el Alwen∗ New York University Chris Peikert † Georgia Institute of Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-25 13:43:28
17Better Key Sizes (and Attacks) for LWE-Based Encryption Richard Lindner∗ Chris Peikert†

Better Key Sizes (and Attacks) for LWE-Based Encryption Richard Lindner∗ Chris Peikert†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-11-30 13:28:50
18Attribute-Based Functional Encryption on Lattices (Extended Abstract) Xavier Boyen December 31, 2012

Attribute-Based Functional Encryption on Lattices (Extended Abstract) Xavier Boyen December 31, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-31 10:07:10
19Proposal of a new efficient public key system for encryption and digital signatures Gerold Gr¨ unauer Email:

Proposal of a new efficient public key system for encryption and digital signatures Gerold Gr¨ unauer Email:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-11-27 12:23:14
20Algebraic Algorithms for LWE Martin R. Albrecht1 , Carlos Cid1 , Jean-Charles Faug`ere2 , and Ludovic Perret2 1 Information Security Group Royal Holloway, University of London

Algebraic Algorithms for LWE Martin R. Albrecht1 , Carlos Cid1 , Jean-Charles Faug`ere2 , and Ludovic Perret2 1 Information Security Group Royal Holloway, University of London

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-26 10:18:21