Ideal lattice cryptography

Results: 53



#Item
21Practical Lattice-based Digital Signature Schemes NIST Workshop on Cybersecurity in a Post-Quantum World J. Howe, T. Pöppelmann, M. O’Neill, E. O’Sullivan, T. Güneysu, V. Lyubashevsky

Practical Lattice-based Digital Signature Schemes NIST Workshop on Cybersecurity in a Post-Quantum World J. Howe, T. Pöppelmann, M. O’Neill, E. O’Sullivan, T. Güneysu, V. Lyubashevsky

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 13:38:18
22Abstract  Fix an integer m > 2 and let K be a number field containing the mth roots of unity with ring of integers R. Suppose that a is an element of K with a = c/d for c, d ∈ R, and that b is an ideal of R relatively

Abstract Fix an integer m > 2 and let K be a number field containing the mth roots of unity with ring of integers R. Suppose that a is an element of K with a = c/d for c, d ∈ R, and that b is an ideal of R relatively

Add to Reading List

Source URL: douglassquirrel.com

Language: English - Date: 2013-08-17 18:16:01
23THE CONTENTS OF THIS TEXT ARE ADAPTED FROM THE TYPED N O T E S O F S E A N S AT H E R - W A G S TA F F, F R O M A C O U R S E G I V E N B Y B E N E D I C T G R O S S I N U TA H I N , W H I C H U S E S M A N Y I

THE CONTENTS OF THIS TEXT ARE ADAPTED FROM THE TYPED N O T E S O F S E A N S AT H E R - W A G S TA F F, F R O M A C O U R S E G I V E N B Y B E N E D I C T G R O S S I N U TA H I N , W H I C H U S E S M A N Y I

Add to Reading List

Source URL: slugmath.ucsc.edu

Language: English - Date: 2009-03-28 15:16:01
24THE CONTENTS OF THIS TEXT ARE ADAPTED FROM THE TYPED N O T E S O F S E A N S AT H E R - W A G S TA F F, F R O M A C O U R S E G I V E N B Y B E N E D I C T G R O S S I N U TA H I N , W H I C H U S E S M A N Y I

THE CONTENTS OF THIS TEXT ARE ADAPTED FROM THE TYPED N O T E S O F S E A N S AT H E R - W A G S TA F F, F R O M A C O U R S E G I V E N B Y B E N E D I C T G R O S S I N U TA H I N , W H I C H U S E S M A N Y I

Add to Reading List

Source URL: slugmath.ucsc.edu

Language: English - Date: 2009-04-13 11:28:00
25THE CONTENTS OF THIS TEXT ARE ADAPTED FROM THE TYPED N O T E S O F S E A N S AT H E R - W A G S TA F F, F R O M A C O U R S E G I V E N B Y B E N E D I C T G R O S S I N U TA H I N , W H I C H U S E S M A N Y I

THE CONTENTS OF THIS TEXT ARE ADAPTED FROM THE TYPED N O T E S O F S E A N S AT H E R - W A G S TA F F, F R O M A C O U R S E G I V E N B Y B E N E D I C T G R O S S I N U TA H I N , W H I C H U S E S M A N Y I

Add to Reading List

Source URL: slugmath.ucsc.edu

Language: English - Date: 2009-03-29 13:00:09
26THE CONTENTS OF THIS TEXT ARE ADAPTED FROM THE TYPED N O T E S O F S E A N S AT H E R - W A G S TA F F, F R O M A C O U R S E G I V E N B Y B E N E D I C T G R O S S I N U TA H I N , W H I C H U S E S M A N Y I

THE CONTENTS OF THIS TEXT ARE ADAPTED FROM THE TYPED N O T E S O F S E A N S AT H E R - W A G S TA F F, F R O M A C O U R S E G I V E N B Y B E N E D I C T G R O S S I N U TA H I N , W H I C H U S E S M A N Y I

Add to Reading List

Source URL: slugmath.ucsc.edu

Language: English - Date: 2009-03-28 15:07:41
27Securing the cloud with homomorphic encryption Research Directorate staff

Securing the cloud with homomorphic encryption Research Directorate staff

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2014-06-10 12:49:49
28Functional Encryption for Inner Product Predicates from Learning with Errors Shweta Agrawal∗ University of California, Los Angeles, USA [removed]

Functional Encryption for Inner Product Predicates from Learning with Errors Shweta Agrawal∗ University of California, Los Angeles, USA [removed]

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2011-09-02 00:42:27
29Lattice Signatures Without Trapdoors Vadim Lyubashevsky INRIA / ENS, Paris Signature Schemes • Hash-and-Sign

Lattice Signatures Without Trapdoors Vadim Lyubashevsky INRIA / ENS, Paris Signature Schemes • Hash-and-Sign

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:19
30Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller Daniele Micciancio1 1 UC  Chris Peikert2

Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller Daniele Micciancio1 1 UC Chris Peikert2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:19