scientific article; zbMATH DE number 6823399
From MaRDI portal
Publication:4602283
Recommendations
- Post-quantum cryptography: lattice identification schemes
- Chosen ciphertext attacks on lattice-based public key encryption and modern cryptography in a quantum environment
- Quantum differential and linear cryptanalysis
- On the optimality of quantum encryption schemes
- Cryptanalysis and improvement of several quantum private comparison protocols
- Some Recent Progress in Lattice-Based Cryptography
- Quantum differential cryptanalysis
- Chosen ciphertext attacks on lattice-based public key encryption and modern (non-quantum) cryptography in a quantum environment
Cited in
(6)- Lattice Klepto -- turning post-quantum crypto against itself
- New mission and opportunity for mathematics researchers: cryptography in the quantum era
- A modification proposal for the reconciliation mechanism of the key exchange algorithm NewHope
- Lattice attacks on NTRU and LWE: a history of refinements
- The polynomial learning with errors problem and the smearing condition
- Lattice reduction for modules, or how to reduce ModuleSVP to ModuleSVP
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4602283)