scientific article; zbMATH DE number 1559544
From MaRDI portal
Publication:4526993
zbMATH Open0962.68055MaRDI QIDQ4526993FDOQ4526993
Authors: Miklós Ajtai, Cynthia Dwork
Publication date: 28 February 2001
Title of this publication is not available (Why is that?)
Recommendations
Cited In (only showing first 100 items - show all)
- Approximation schemes via Sherali-Adams hierarchy for dense constraint satisfaction problems and assignment problems
- An efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using lattice
- Analysis of error terms of signatures based on learning with errors
- Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures
- Title not available (Why is that?)
- A fast phase-based enumeration algorithm for SVP challenge through \(y\)-sparse representations of short lattice vectors
- On a family of preimage-resistant functions
- The geometry of lattice cryptography
- On the Communication Complexity of Key-Agreement Protocols.
- Learning mixtures of arbitrary distributions over large discrete domains
- Enhancing Goldreich, Goldwasser and Halevi's scheme with intersecting lattices
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- A parametric version of LLL and some consequences: parametric shortest and closest vector problems
- Faster private release of marginals on small databases
- Minicrypt primitives with algebraic structure and applications
- Expanders with respect to Hadamard spaces and random graphs (extended abstract)
- Improved hardness results for unique shortest vector problem
- Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates
- Security analysis of cryptosystems using short generators over ideal lattices
- Lattice preconditioning for the real relaxation branch-and-bound approach for integer least squares problems
- Public-key encryption from homogeneous CLWE
- Locally testable codes and Cayley graphs
- A survey on post-quantum based approaches for edge computing security
- Too many hints -- when LLL breaks LWE
- A probability inequality with application to lattice theory
- A generalization of NTRUEncrypt
- Cyclic lattices, ideal lattices, and bounds for the smoothing parameter
- On the LWE cryptosystem with more general disturbance
- On the high dimensional RSA algorithm -- a public key cryptosystem based on lattice and algebraic number theory
- Lattice-based FHE as secure as PKE
- Rate-independent computation in continuous chemical reaction networks
- Generalized learning problems and applications to non-commutative cryptography. (Extended abstract)
- Adversarial hypothesis testing and a quantum Stein's lemma for restricted measurements (extended abstract)
- Iterated group products and leakage resilience against \(\mathrm{NC}^1\)
- Representing hard lattices with \(O(n\log n)\) bits (extended abstract)
- A note on perfect correctness by derandomization
- The matrix reloaded: multiplication strategies in FrodoKEM
- Private interactive communication across an adversarial channel
- Quantum hardness of learning shallow classical circuits
- Hardness of approximating the shortest vector problem in high \(\ell_{p}\) norms
- Breaking the \(O(\sqrt{n})\)-bit barrier: Byzantine agreement with polylog bits per party
- Improved Zero-Knowledge Identification with Lattices
- Redrawing the boundaries on purchasing data from privacy-sensitive individuals
- Vandermonde meets Regev: public key encryption schemes based on partial Vandermonde problems
- Interactions of computational complexity theory and mathematics
- A note on perfect correctness by derandomization
- Explicit Hard Instances of the Shortest Vector Problem
- Direct sum fails for zero error average communication
- Invitation games and the price of stability
- Parameterized testability
- Gate elimination for linear functions and new feebly secure constructions
- Post-quantum cryptosystems: open problems and solutions. Lattice-based cryptosystems
- On the SVP for low-dimensional circulant lattices
- Parameterized intractability of even set and shortest vector problem from Gap-ETH
- Circuit complexity of linear functions: gate elimination and feeble security
- Multikey fully homomorphic encryption and applications
- Do Not Bound to a Single Position: Near-Optimal Multi-positional Mismatch Attacks Against Kyber and Saber
- Time and Query Complexity Tradeoffs for the Dihedral Coset Problem
- Duplication free public keys based on SIS-type problems
- On codes and learning with errors over function fields
- On the unique shortest lattice vector problem
- Improved broadcast attacks against subset sum problems via lattice oracle
- Improved analysis of the reduction from BDD to uSVP
- Homomorphic encryption: a mathematical survey
- Single trace analysis of comparison operation based constant-time CDT sampling and its countermeasure
- Commitments with efficient zero-knowledge arguments from subset sum problems
- Improvements in the analysis of Kannan's CVP algorithm
- New transference theorems on lattices possessing \(n^\varepsilon\)-unique shortest vectors
- SoK: how (not) to design and implement post-quantum cryptography
- A Digital Signature Scheme Based on CVP ∞
- Tree codes and a conjecture on exponential sums
- Limits of local algorithms over sparse random graphs
- Complexity of approximating CSP with balance / hard constraints
- On random nonsingular Hermite normal form
- Challenges of symbolic computation: My favorite open problems. With an additional open problem by Robert M. Corless and David J. Jeffrey
- Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems
- Rigorous and Efficient Short Lattice Vectors Enumeration
- Quantum algorithm design: techniques and applications
- Cryptogenography
- Mechanism design in large games: incentives and privacy (extended abstract)
- Lattice-based key exchange on small integer solution problem
- Capacity of non-malleable codes
- Testers and their applications
- Deterministic compression with uncertain priors
- Black-box obfuscation for \(d\)-CNFs
- Sequential decision making with vector outcomes
- Chosen ciphertext attacks on lattice-based public key encryption and modern (non-quantum) cryptography in a quantum environment
- Decision trees, protocols and the entropy-influence conjecture
- Predicting Lattice Reduction
- Why do simple algorithms for triangle enumeration work in the real world?
- A relation of primal--dual lattices and the complexity of shortest lattice vector problem
- Approximate Voronoi cells for lattices, revisited
- New lattice based cryptographic constructions
- Hardness of LWE on general entropic distributions
- Magnifying computing gaps. Establishing encrypted communication over unidirectional channels
- More on average case vs approximation complexity
- New lattice-based cryptographic constructions
- An experimental comparison of some LLL-type lattice basis reduction algorithms
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
- A new transference theorem in the geometry of numbers and new bounds for Ajtai's connection factor
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4526993)