SWIFFT: A Modest Proposal for FFT Hashing

From MaRDI portal
Publication:3525661

DOI10.1007/978-3-540-71039-4_4zbMath1154.68403OpenAlexW1525538795WikidataQ21681000 ScholiaQ21681000MaRDI QIDQ3525661

Chris Peikert, Vadim Lyubashevsky, Alon Rosen, Daniele Micciancio

Publication date: 18 September 2008

Published in: Fast Software Encryption (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-71039-4_4




Related Items (44)

Efficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to PrivacyAn intermediate secret-guessing attack on hash-based signaturesCryptography from Learning Parity with NoiseImproved Information Set Decoding for Code-Based Cryptosystems with Constrained MemorySurvey of information securityMemory lower bounds of reductions revisitedFaster Gaussian sampling for trapdoor lattices with arbitrary modulusPost-quantum cryptography: lattice signaturesA pseudorandom number generator based on worst-case lattice problemsWhen NTT meets Karatsuba: preprocess-then-NTT technique revisitedLattice Point Enumeration on Block Reduced BasesAugmented Learning with Errors: The Untapped Potential of the Error TermScalable zero knowledge via cycles of elliptic curvesDakota – Hashing from a Combination of Modular Arithmetic and Symmetric CryptographyMiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative ComplexityBLOOM: bimodal lattice one-out-of-many proofs and applicationsD-NTRU: more efficient and average-case IND-CPA secure NTRU variantEfficient lattice-based inner-product functional encryptionCCA updatable encryption against malicious re-encryption attacksThe extended \(k\)-tree algorithmImproved combinatorial algorithms for the inhomogeneous short integer solution problemAnalysis of Multivariate Hash FunctionsHow to Build a Hash Function from Any Collision-Resistant FunctionA characterization of chameleon hash functions and new, efficient designsETRU: NTRU over the Eisenstein integersOn the complexity of the BKW algorithm on LWEComputing Generator in Cyclotomic Integer RingsAmortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness SlackImproved Zero-Knowledge Identification with LatticesInterpreting Hash Function Security ProofsCryptographic Functions from Worst-Case Complexity AssumptionsHash Functions from Sigma Protocols and Improvements to VSHConcurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice ProblemsRigorous and Efficient Short Lattice Vectors EnumerationLattice-Based Identification Schemes Secure Under Active AttacksAsymptotically Efficient Lattice-Based Digital SignaturesAn Efficient Post-Quantum One-Time Signature SchemeOn the security of homomorphic encryption on approximate numbersSWIFFTThe Geometry of Lattice CryptographyHow to Prove Knowledge of Small SecretsA new Gaussian sampling for trapdoor lattices with arbitrary modulusA Parallel GPU Implementation of SWIFFTXPseudorandom Functions: Three Decades Later


Uses Software



This page was built for publication: SWIFFT: A Modest Proposal for FFT Hashing