Implementation of lattice trapdoors on modules and applications
From MaRDI portal
Publication:2118540
Recommendations
Cites work
- scientific article; zbMATH DE number 1186948 (Why is no real title available?)
- scientific article; zbMATH DE number 799789 (Why is no real title available?)
- scientific article; zbMATH DE number 1445397 (Why is no real title available?)
- A practical implementation of identity-based encryption over NTRU lattices
- A toolkit for ring-LWE cryptography
- Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters
- Approx-SVP in ideal lattices with pre-processing
- Approximate trapdoors for lattices and smaller hash-and-sign signatures
- Asymptotically Efficient Lattice-Based Digital Signatures
- Attribute-based encryption for circuits
- Bonsai trees, or how to delegate a lattice basis
- Efficient identity-based encryption over NTRU lattices
- Efficient lattice (H)IBE in the standard model
- Efficient public key encryption based on ideal lattices (extended abstract)
- Fast Fourier orthogonalization
- Faster Gaussian sampling for trapdoor lattices with arbitrary modulus
- Gaussian sampling over the integers: efficient, generic, constant-time
- Identity-based cryptosystems and signature schemes
- Improvement and efficient implementation of a lattice-based signature scheme
- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
- Lattice mixing and vanishing trapdoors: a framework for fully secure short signatures and more
- Lattice-based group signatures with logarithmic signature size
- On ideal lattices and learning with errors over rings
- Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices
- Practical implementation of Ring-SIS/LWE based signature and IBE
- Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
- Sampling exactly from the normal distribution
- Short, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofs
- The lattice-based digital signature scheme qTESLA
- Theory of Cryptography
- Trapdoors for hard lattices and new cryptographic constructions
- Trapdoors for ideal lattices with applications
- Trapdoors for lattices: simpler, tighter, faster, smaller
- Worst-case to average-case reductions for module lattices
- Worst‐Case to Average‐Case Reductions Based on Gaussian Measures
Cited in
(12)- Lattice signature with efficient protocols, application to anonymous credentials
- Practical implementation of Ring-SIS/LWE based signature and IBE
- \textsc{Antrag}: annular NTRU trapdoor generation. Making \textsc{Mitaka} as secure as FALCON
- Towards a simpler lattice gadget toolkit
- Improvement and efficient implementation of a lattice-based signature scheme
- Gadget-based iNTRU lattice trapdoors
- A lattice-based forward secure IBE scheme for Internet of things
- MuSig-L: lattice-based multi-signature with single-round online phase
- Chosen-ciphertext secure dual-receiver encryption in the standard model based on post-quantum assumptions
- Towards compact identity-based encryption on ideal lattices
- Efficient identity-based encryption over NTRU lattices
- Identity-based encryption from lattices using approximate trapdoors
This page was built for publication: Implementation of lattice trapdoors on modules and applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2118540)