Index of /tech/cryptography & mathematics/lattice-based cryptography

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[DIR]ntru/2023-08-25 22:24 -  
[   ]Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography (2016) - Longa, Naehrig.pdf2023-08-25 22:24 393K 
[   ]Security of Cryptosystems Using Short Generators Over Ideal Lattices (2015) - Okumura, et. al.pdf2023-08-25 22:24 500K 
[   ]Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem (2009) - Peikert.pdf2023-08-25 22:24 360K 
[   ]Post-Quantum Authenticated Key Exchange from Ideal Lattices (2015) - Zhang², Ding, Snook, Dagdelen.pdf2023-08-25 22:24 843K 
[   ]On the concrete hardness of Learning with Errors (2015) - Albrecht, Player, Scott.pdf2023-08-25 22:24 580K 
[   ]On the Concrete Hardness of Learning with Errors (2015) - Albrecht, Player, Scott.pdf2023-08-25 22:24 526K 
[   ]On Reliability, Reconciliation, and Error-Correction in R-LWE Encryption (2017) - Saarinen.pdf2023-08-25 22:24 598K 
[   ]On Ideal Lattices and Learning with Errors Over Rings (2012) - Lyubashevsky, Peikert, Regev.pdf2023-08-25 22:24 572K 
[   ]Newhope Without Reconciliation (2016) - Alkim, Ducas, Pöppelmann, Schwabe.pdf2023-08-25 22:24 520K 
[   ]Lattice Signatures and Bimodal Gaussians (2015) - Ducas, Durmus, Lepoint, Lyubashevsky.pdf2023-08-25 22:24 746K 
[   ]Lattice Cryptography for the Internet (2014) - Peikert.pdf2023-08-25 22:24 353K 
[   ]LOL: Functional Lattice Cryptography (2016) - Peikert.pdf2023-08-25 22:24 605K 
[   ]Improved Exponential-time Algorithms for Inhomogeneous-SIS (2014) - Bai, Galbraith, Li, Sheffield.pdf2023-08-25 22:24 398K 
[   ]Improved Combinatorial Algorithms for the Inhomogenous Short Integer Solution Problem (2014) - Bai, Galbraith, Li, Sheffield.pdf2023-08-25 22:24 398K 
[   ]How (Not) To Instantiate RLWE (2016) - Peikert.pdf2023-08-25 22:24 571K 
[   ]Hash Proof Systems over Lattices Revisited (2017) - Benhamouda, Blazy, Ducas, Quach.pdf2023-08-25 22:24 728K 
[   ]Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE (2016) - Bos, Costello, Ducas, Miranov, Naehrig, Nikolaenko, Raghunathan, Stebila.pdf2023-08-25 22:24 696K 
[   ]Efficient Software Implementation of Ring-LWE Encryption (2014) - de Clercq, Roy, Vercauteren, Verbauwhede.pdf2023-08-25 22:24 259K 
[   ]Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions, Or: How to secretly embed a circuit in your PRF (2015) - Brakerski.pdf2023-08-25 22:24 492K 
[   ]CRYSTALS - Kyber: a CCA-Secure Module-Lattice-Based KEM (2017) - Bos, Ducas, Kiltz, Lepoint, Lyubashevsky, Schanck, Schwabe, Stehlé.pdf2023-08-25 22:24 879K 
[   ]Accelerating BLISS: the geometry of ternary polynomials (2014) - Ducas.pdf2023-08-25 22:24 357K 
[   ]A Subfield Logarithm Attack Against Ideal Lattices (2014) - Bernstein.pdf2023-08-25 22:24 94K 
[   ]A Subfield Lattice Attack on Overstreched NTRU Assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes (2016) - Albrecht, Bai, Ducas.pdf2023-08-25 22:24 500K 

Apache/2.4.59 (Debian) Server at idouzi.info Port 80