Pages that link to "Item:Q2835586"
From MaRDI portal
The following pages link to A Subfield Lattice Attack on Overstretched NTRU Assumptions (Q2835586):
Displaying 34 items.
- Algorithmic acceleration of B/FV-like somewhat homomorphic encryption for compute-enabled RAM (Q832329) (← links)
- The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks (Q1631346) (← links)
- Return of GGH15: provable security against zeroizing attacks (Q1631349) (← links)
- A full RNS variant of FV like somewhat homomorphic encryption schemes (Q1698661) (← links)
- Provably secure NTRUEncrypt over any cyclotomic field (Q1726689) (← links)
- A public-key encryption scheme based on non-linear indeterminate equations (Q1746969) (← links)
- Vulnerable public keys in NTRU cryptosystem (Q1997177) (← links)
- A framework for cryptographic problems from linear algebra (Q2023808) (← links)
- On the ideal shortest vector problem over random rational primes (Q2056701) (← links)
- Fast reduction of algebraic lattices over cyclotomic fields (Q2096520) (← links)
- How to meet ternary LWE keys (Q2128581) (← links)
- Towards faster polynomial-time lattice reduction (Q2128584) (← links)
- A trace map attack against special ring-LWE samples (Q2128748) (← links)
- Constructions for quantum indistinguishability obfuscation (Q2146070) (← links)
- Faster homomorphic encryption over GPGPUs via hierarchical DGT (Q2147259) (← links)
- Gadget-based iNTRU lattice trapdoors (Q2152053) (← links)
- Flattening NTRU for evaluation key free homomorphic encryption (Q2191204) (← links)
- Characterizing overstretched NTRU attacks (Q2191207) (← links)
- D-NTRU: more efficient and average-case IND-CPA secure NTRU variant (Q2195452) (← links)
- Modular lattice signatures, revisited (Q2302153) (← links)
- Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions (Q2661695) (← links)
- Revisiting lower dimension lattice attacks on NTRU (Q2681396) (← links)
- Maliciously circuit-private multi-key FHE and MPC based on LWE (Q2701482) (← links)
- The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs (Q2827724) (← links)
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 (Q2829233) (← links)
- Digital Signatures Based on the Hardness of Ideal Lattice Problems in All Rings (Q2953777) (← links)
- An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero (Q2971014) (← links)
- A Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$ (Q2988333) (← links)
- Multi-key FHE from LWE, Revisited (Q3181028) (← links)
- A Lattice Attack on Homomorphic NTRU with Non-invertible Public Keys (Q3297504) (← links)
- On the security of functional encryption in the generic group model (Q6095189) (← links)
- A polynomial time algorithm for breaking NTRU encryption with multiple keys (Q6109713) (← links)
- Multi-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrapping (Q6132971) (← links)
- Subfield algorithms for ideal- and module-SVP based on the decomposition group (Q6196952) (← links)