The following pages link to Theory of Cryptography (Q5898646):
Displaying 17 items.
- A Parallel GPU Implementation of SWIFFTX (Q5014677) (← links)
- Compact Privacy Protocols from Post-quantum and Timed Classical Assumptions (Q5041222) (← links)
- Cryptographic Functions from Worst-Case Complexity Assumptions (Q5188549) (← links)
- Lattice-Based Identification Schemes Secure Under Active Attacks (Q5445452) (← links)
- Asymptotically Efficient Lattice-Based Digital Signatures (Q5445497) (← links)
- Short Stickelberger Class Relations and Application to Ideal-SVP (Q5738882) (← links)
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE (Q5738886) (← links)
- Tighter security proofs for GPV-IBE in the quantum random oracle model (Q5925501) (← links)
- A new lattice-based online/offline signatures framework for low-power devices (Q6159029) (← links)
- Lattice-based programmable hash functions and applications (Q6182001) (← links)
- Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing (Q6494637) (← links)
- A multi-group signature scheme from lattices (Q6536219) (← links)
- Ideal-SVP is hard for small-norm uniform prime ideals (Q6587946) (← links)
- Algebraically structured LWE, revisited (Q6595844) (← links)
- Discriminants of number fields (Q6618241) (← links)
- On algebraic embedding for unstructured lattices (Q6635822) (← links)
- Constant-round simulation-secure coin tossing extension with guaranteed output (Q6637540) (← links)