The following pages link to ring-LWE (Q30859):
Displaying 46 items.
- Sampling from discrete Gaussians for lattice-based cryptography on a constrained device (Q742507) (← links)
- The closest vector problem in tensored root lattices of type A and in their duals (Q1692156) (← links)
- Discretisation and product distributions in ring-LWE (Q2027267) (← links)
- (In)security of ring-LWE under partial key exposure (Q2027270) (← links)
- Towards a ring analogue of the leftover hash lemma (Q2027271) (← links)
- Chosen-ciphertext lattice-based public key encryption with equality test in standard model (Q2072076) (← links)
- Rounding in the rings (Q2096527) (← links)
- Efficient pseudorandom correlation generators from ring-LPN (Q2096531) (← links)
- A new post-quantum multivariate polynomial public key encapsulation algorithm (Q2102772) (← links)
- Implementation of lattice trapdoors on modules and applications (Q2118540) (← links)
- Asymptotically quasi-optimal cryptography (Q2170004) (← links)
- Properties of constacyclic codes under the Schur product (Q2182071) (← links)
- A new Gaussian sampling for trapdoor lattices with arbitrary modulus (Q2329396) (← links)
- Worst-case to average-case reductions for module lattices (Q2345928) (← links)
- Asymptotically efficient lattice-based digital signatures (Q2413615) (← links)
- Bootstrapping for helib (Q2661696) (← links)
- Post-quantum online voting scheme (Q2670852) (← links)
- On the hardness of module learning with errors with short distributions (Q2677644) (← links)
- Improving speed and security in updatable encryption schemes (Q2691598) (← links)
- Simpler statistically sender private oblivious transfer from ideals of cyclotomic integers (Q2692389) (← links)
- Bootstrapping for BGV and BFV revisited (Q2697680) (← links)
- Ring-based identity based encryption -- asymptotically shorter MPK and tighter security (Q2697891) (← links)
- Adaptive Security with Quasi-Optimal Rate (Q2796140) (← links)
- Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes (Q2817869) (← links)
- The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs (Q2827724) (← links)
- How (Not) to Instantiate Ring-LWE (Q2827731) (← links)
- Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE (Q2829234) (← links)
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes (Q2829951) (← links)
- Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps (Q2953793) (← links)
- A Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$ (Q2988333) (← links)
- The linear transformation that relates the canonical and coefficient embeddings of ideals in cyclotomic integer rings (Q4595068) (← links)
- A Toolkit for Ring-LWE Cryptography (Q4924402) (← links)
- Quantum Hardness of Learning Shallow Classical Circuits (Q4994987) (← links)
- Algebraic Aspects of Solving Ring-LWE, Including Ring-Based Improvements in the Blum--Kalai--Wasserman Algorithm (Q5001674) (← links)
- PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model (Q5041165) (← links)
- Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography (Q5041172) (← links)
- Efficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to Privacy (Q5041224) (← links)
- Homomorphic Encryption Standard (Q5044564) (← links)
- On the Scaled Inverse of $(x^i-x^j)$ modulo Cyclotomic Polynomial of the form $\Phi_{p^s}(x)$ or $\Phi_{p^s q^t}(x)$ (Q5074074) (← links)
- LP Solutions of Vectorial Integer Subset Sums – Cryptanalysis of Galbraith’s Binary Matrix LWE (Q5738780) (← links)
- Provably Secure NTRU Instances over Prime Cyclotomic Rings (Q5738796) (← links)
- Computing Generator in Cyclotomic Integer Rings (Q5738871) (← links)
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE (Q5738886) (← links)
- On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL (Q5738971) (← links)
- Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices (Q5918662) (← links)
- Tighter security proofs for GPV-IBE in the quantum random oracle model (Q5925501) (← links)