The following pages link to How (Not) to Instantiate Ring-LWE (Q2827731):
Displaying 17 items.
- SoK: how (not) to design and implement post-quantum cryptography (Q826276) (← links)
- On the ring-LWE and polynomial-LWE problems (Q1648786) (← links)
- Post-quantum key exchange for the Internet and the open quantum safe project (Q1698609) (← links)
- (In)security of ring-LWE under partial key exposure (Q2027270) (← links)
- Rounding in the rings (Q2096527) (← links)
- A trace map attack against special ring-LWE samples (Q2128748) (← links)
- Non-commutative ring learning with errors from cyclic algebras (Q2154559) (← links)
- Algebraically structured LWE. Revisited (Q2175901) (← links)
- Practical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiency (Q2334442) (← links)
- Error analysis of weak poly-LWE instances (Q2632837) (← links)
- A Subfield Lattice Attack on Overstretched NTRU Assumptions (Q2835586) (← links)
- Attacks on the Search RLWE Problem with Small Errors (Q4603026) (← links)
- Algebraic Aspects of Solving Ring-LWE, Including Ring-Based Improvements in the Blum--Kalai--Wasserman Algorithm (Q5001674) (← links)
- The Complexity of Public-Key Cryptography (Q5021130) (← links)
- Homomorphic Encryption Standard (Q5044564) (← links)
- Integer Version of Ring-LWE and Its Applications (Q5216985) (← links)
- Somewhat/Fully Homomorphic Encryption: Implementation Progresses and Challenges (Q5739024) (← links)