scientific article; zbMATH DE number 1559544

From MaRDI portal
Revision as of 09:16, 7 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4526993

zbMath0962.68055MaRDI QIDQ4526993

Cynthia Dwork, Miklós Ajtai

Publication date: 28 February 2001


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (only showing first 100 items - show all)

On random nonsingular Hermite normal formLattice-based key exchange on small integer solution problemSoK: how (not) to design and implement post-quantum cryptographyLower bounds on lattice sieving and information set decodingMagnifying computing gaps. Establishing encrypted communication over unidirectional channelsImproved hardness results for unique shortest vector problemA note on perfect correctness by derandomizationThe matrix reloaded: multiplication strategies in FrodoKEMCryptographic hardness of random local functions. SurveyChosen ciphertext attacks on lattice-based public key encryption and modern (non-quantum) cryptography in a quantum environmentA thirty year old conjecture about promise problemsVandermonde meets Regev: public key encryption schemes based on partial Vandermonde problemsA Fast Phase-based Enumeration Algorithm for SVP Challenge Through $$y$$-Sparse Representations of Short Lattice VectorsLattice Point Enumeration on Block Reduced BasesPASS-encrypt: a public key cryptosystem based on partial evaluation of polynomialsNew transference theorems on lattices possessing \(n^\varepsilon\)-unique shortest vectorsImproved analysis of the reduction from BDD to uSVPImproved broadcast attacks against subset sum problems via lattice oracleMultikey Fully Homomorphic Encryption and ApplicationsPost-quantum key exchange for the Internet and the open quantum safe projectSecurity considerations for Galois non-dual RLWE familiesCircuit complexity of linear functions: gate elimination and feeble securityMore on average case vs approximation complexityComputational indistinguishability between quantum states and its cryptographic applicationGauss Sieve Algorithm on GPUsApproximating the SVP to within a factor \((1+1/\dim^\varepsilon)\) is NP-hard under randomized reductionsExplicit Hard Instances of the Shortest Vector ProblemAn efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using latticeAnalysis of Error Terms of Signatures Based on Learning with ErrorsLattice-based FHE as secure as PKECryptogenographyLimits of random oracles in secure computationNon-commutative arithmetic circuits with divisionDecision trees, protocols and the entropy-influence conjectureLocally testable codes and cayley graphsInvitation games and the price of stabilityWelfare maximization and truthfulness in mechanism design with ordinal preferencesCoordination mechanisms from (almost) all scheduling policiesPrivate interactive communication across an adversarial channelTree codes and a conjecture on exponential sumsCapacity of non-malleable codesLinear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applicationsAdversarial hypothesis testing and a quantum stein's lemma for restricted measurementsSequential decision making with vector outcomesLearning mixtures of arbitrary distributions over large discrete domainsWhy do simple algorithms for triangle enumeration work in the real world?Black-box obfuscation for d-CNFsCandidate weak pseudorandom functions in AC 0 ○ MOD 2Iterated group products and leakage resilience against NC1Building one-time memories from isolated qubitsAttribute-efficient evolvability of linear functionsEnergy-efficient circuit designRate-independent computation in continuous chemical reaction networksTesters and their applicationsOn the automorphism groups of strongly regular graphs IFaster private release of marginals on small databasesMechanism design in large gamesRedrawing the boundaries on purchasing data from privacy-sensitive individualsApproximation schemes via Sherali-Adams hierarchy for dense constraint satisfaction problems and assignment problemsComplexity of approximating CSP with balance / hard constraintsInteger feasibility of random polytopesMultireference alignment using semidefinite programmingPartial tests, universal tests and decomposabilityHigh dimensional expanders and property testingParameterized testabilityDirect sum fails for zero error average communicationRational argumentsQuantum algorithm design: techniques and applicationsExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationAlgorithms for the Shortest and Closest Lattice Vector ProblemsGate Elimination for Linear Functions and New Feebly Secure ConstructionsNew Algorithms for Learning in Presence of ErrorsA public-key encryption scheme based on non-linear indeterminate equationsLattice preconditioning for the real relaxation branch-and-bound approach for integer least squares problemsSecurity analysis of cryptosystems using short generators over ideal latticesEnhancing Goldreich, Goldwasser and Halevi's scheme with intersecting latticesHardness of approximating the shortest vector problem in high \(\ell_{p}\) normsOn the structure of Boolean functions with small spectral normConcurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice ProblemsRigorous and Efficient Short Lattice Vectors EnumerationFinding Shortest Lattice Vectors in the Presence of GapsApproximate Voronoi cells for lattices, revisitedAn experimental comparison of some LLL-type lattice basis reduction algorithmsDecompositions of Triangle-Dense GraphsBetter Key Sizes (and Attacks) for LWE-Based EncryptionCryptographic hardness for learning intersections of halfspacesOn a family of preimage-resistant functionsAlgebraic cryptography: new constructions and their security against provable breakSearchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensionsThe Geometry of Lattice CryptographyGeneralized Learning Problems and Applications to Non-commutative CryptographyHardness of approximating the minimum solutions of linear Diophantine equationsA relation of primal--dual lattices and the complexity of shortest lattice vector problemOn the limits of nonapproximability of lattice problemsChallenges of symbolic computation: My favorite open problems. With an additional open problem by Robert M. Corless and David J. JeffreyA note on the non-NP-hardness of approximate lattice problems under general Cook reductions.Public-key cryptography and invariant theoryA lattice-based public-key cryptosystemA new transference theorem in the geometry of numbers and new bounds for Ajtai's connection factorHardness of LWE on general entropic distributions







This page was built for publication: