| Name | Last modified | Size | Description |
|
| Parent Directory | | - | |
| CRYSTALS - Kyber: a CCA-Secure Module-Lattice-Based KEM (2017) - Bos, Ducas, Kiltz, Lepoint, Lyubashevsky, Schanck, Schwabe, Stehlé.pdf | 2023-08-25 22:24 | 879K | |
| Post-Quantum Authenticated Key Exchange from Ideal Lattices (2015) - Zhang², Ding, Snook, Dagdelen.pdf | 2023-08-25 22:24 | 843K | |
| Lattice Signatures and Bimodal Gaussians (2015) - Ducas, Durmus, Lepoint, Lyubashevsky.pdf | 2023-08-25 22:24 | 746K | |
| Hash Proof Systems over Lattices Revisited (2017) - Benhamouda, Blazy, Ducas, Quach.pdf | 2023-08-25 22:24 | 728K | |
| Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE (2016) - Bos, Costello, Ducas, Miranov, Naehrig, Nikolaenko, Raghunathan, Stebila.pdf | 2023-08-25 22:24 | 696K | |
| LOL: Functional Lattice Cryptography (2016) - Peikert.pdf | 2023-08-25 22:24 | 605K | |
| On Reliability, Reconciliation, and Error-Correction in R-LWE Encryption (2017) - Saarinen.pdf | 2023-08-25 22:24 | 598K | |
| On the concrete hardness of Learning with Errors (2015) - Albrecht, Player, Scott.pdf | 2023-08-25 22:24 | 580K | |
| On Ideal Lattices and Learning with Errors Over Rings (2012) - Lyubashevsky, Peikert, Regev.pdf | 2023-08-25 22:24 | 572K | |
| How (Not) To Instantiate RLWE (2016) - Peikert.pdf | 2023-08-25 22:24 | 571K | |
| On the Concrete Hardness of Learning with Errors (2015) - Albrecht, Player, Scott.pdf | 2023-08-25 22:24 | 526K | |
| Newhope Without Reconciliation (2016) - Alkim, Ducas, Pöppelmann, Schwabe.pdf | 2023-08-25 22:24 | 520K | |
| Security of Cryptosystems Using Short Generators Over Ideal Lattices (2015) - Okumura, et. al.pdf | 2023-08-25 22:24 | 500K | |
| A Subfield Lattice Attack on Overstreched NTRU Assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes (2016) - Albrecht, Bai, Ducas.pdf | 2023-08-25 22:24 | 500K | |
| Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions, Or: How to secretly embed a circuit in your PRF (2015) - Brakerski.pdf | 2023-08-25 22:24 | 492K | |
| Improved Exponential-time Algorithms for Inhomogeneous-SIS (2014) - Bai, Galbraith, Li, Sheffield.pdf | 2023-08-25 22:24 | 398K | |
| Improved Combinatorial Algorithms for the Inhomogenous Short Integer Solution Problem (2014) - Bai, Galbraith, Li, Sheffield.pdf | 2023-08-25 22:24 | 398K | |
| Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography (2016) - Longa, Naehrig.pdf | 2023-08-25 22:24 | 393K | |
| Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem (2009) - Peikert.pdf | 2023-08-25 22:24 | 360K | |
| Accelerating BLISS: the geometry of ternary polynomials (2014) - Ducas.pdf | 2023-08-25 22:24 | 357K | |
| Lattice Cryptography for the Internet (2014) - Peikert.pdf | 2023-08-25 22:24 | 353K | |
| Efficient Software Implementation of Ring-LWE Encryption (2014) - de Clercq, Roy, Vercauteren, Verbauwhede.pdf | 2023-08-25 22:24 | 259K | |
| A Subfield Logarithm Attack Against Ideal Lattices (2014) - Bernstein.pdf | 2023-08-25 22:24 | 94K | |
| ntru/ | 2023-08-25 22:24 | - | |
|