Lattice-based cryptography: a survey (Q6183909): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Q4228459 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4542515 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A sieve algorithm for the shortest lattice vector problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in nearest neighbor searching with applications to lattice sieving / rank
 
Normal rank
Property / cites work
 
Property / cites work: BKZ 2.0: Better Lattice Security Estimates / rank
 
Normal rank
Property / cites work
 
Property / cites work: Universal optimality of the \(E_8\) and Leech lattices and interpolation formulas / rank
 
Normal rank
Property / cites work
 
Property / cites work: Short Stickelberger Class Relations and Application to Ideal-SVP / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Identity-Based Encryption over NTRU Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures / rank
 
Normal rank
Property / cites work
 
Property / cites work: \textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon} / rank
 
Normal rank
Property / cites work
 
Property / cites work: On module unique-SVP and NTRU / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4263421 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice Enumeration Using Extreme Pruning / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully homomorphic encryption using ideal lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trapdoors for hard lattices and new cryptographic constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364546 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attribute-based encryption for circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4418531 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3840170 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Worst-case to average-case reductions for module lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Factoring polynomials with rational coefficients / rank
 
Normal rank
Property / cites work
 
Property / cites work: Better Key Sizes (and Attacks) for LWE-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice Signatures without Trapdoors / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Ideal Lattices and Learning with Errors over Rings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sieve algorithms for the shortest vector problem are practical / rank
 
Normal rank
Property / cites work
 
Property / cites work: Approx-SVP in ideal lattices with pre-processing / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the hardness of the NTRU problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the computation of lattice vectors of minimal length, successive minima and reduced bases with applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3210171 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice basis reduction: Improved practical algorithms and solving subset sum problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2757225 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Making NTRU as Secure as Worst-Case Problems over Ideal Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Public Key Encryption Based on Ideal Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: The sphere packing problem in dimension 8 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computational aspects of lattices and their cryptographic applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Learning strikes again: the case of the DRS signature scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Provably Secure NTRU Instances over Prime Cyclotomic Rings / rank
 
Normal rank
Property / cites work
 
Property / cites work: WHAT IS...the Leech Lattice? / rank
 
Normal rank

Latest revision as of 10:55, 22 August 2024

scientific article; zbMATH DE number 7783663
Language Label Description Also known as
English
Lattice-based cryptography: a survey
scientific article; zbMATH DE number 7783663

    Statements

    Lattice-based cryptography: a survey (English)
    0 references
    0 references
    0 references
    0 references
    4 January 2024
    0 references
    0 references
    0 references
    0 references
    0 references
    lattices
    0 references
    post-quantum cryptography
    0 references
    algorithms
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references