Cryptanalysis of lattice-based sequentiality assumptions and proofs of sequential work
From MaRDI portal
Publication:6652963
DOI10.1007/978-3-031-68388-6_6MaRDI QIDQ6652963FDOQ6652963
Authors: Chris Peikert, Yi Tang
Publication date: 13 December 2024
Recommendations
Cites Work
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Worst‐Case to Average‐Case Reductions Based on Gaussian Measures
- On lattices, learning with errors, random linear codes, and cryptography
- Title not available (Why is that?)
- Trapdoors for lattices: simpler, tighter, faster, smaller
- Title not available (Why is that?)
- Simple verifiable delay functions
- Efficient verifiable delay functions
- Simple proofs of sequential work
- Publicly verifiable proofs of sequential work
- Reversible proofs of sequential work
- Lattice-based timed cryptography
Cited In (1)
This page was built for publication: Cryptanalysis of lattice-based sequentiality assumptions and proofs of sequential work
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6652963)