SWIFFT
From MaRDI portal
Software:23528
swMATH11588MaRDI QIDQ23528FDOQ23528
Author name not available (Why is that?)
Source code repository: https://github.com/micciancio/SWIFFT
Cited In (50)
- Fully homomorphic encryption from ring-LWE and security for key dependent messages
- A new Gaussian sampling for trapdoor lattices with arbitrary modulus
- When NTT meets Karatsuba: preprocess-then-NTT technique revisited
- Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems
- Rigorous and Efficient Short Lattice Vectors Enumeration
- A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical
- A lattice-based threshold ring signature scheme
- New generic algorithms for hard knapsacks
- Improving BDD cryptosystems in general lattices
- The geometry of lattice cryptography
- Parallel shortest lattice vector enumeration on graphics cards
- Full Lattice Basis Reduction on Graphics Cards
- Computing generator in cyclotomic integer rings. A subfield algorithm for the principal ideal problem in \(L_{|\varDelta_\mathbb {K}|}\left(\frac{1}{2}\right)\) and application to the cryptanalysis of a FHE scheme
- Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems
- An intermediate secret-guessing attack on hash-based signatures
- How to prove knowledge of small secrets
- MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity
- The extended \(k\)-tree algorithm
- Hash Functions from Sigma Protocols and Improvements to VSH
- Construction of family of hash functions based on ideal lattice
- A Parallel GPU Implementation of SWIFFTX
- Algorithm construction of HLI hash function
- Lattice-Based Identification Schemes Secure Under Active Attacks
- An efficient post-quantum one-time signature scheme
- Improved Zero-Knowledge Identification with Lattices
- Improved short lattice signatures in the standard model
- Pseudorandom functions: three decades later
- On the complexity of the BKW algorithm on LWE
- Cryptographic functions from worst-case complexity assumptions
- Cryptography from learning parity with noise
- A ciphertext policy attribute-based encryption scheme without pairings
- ETRU: NTRU over the Eisenstein integers
- A pseudorandom number generator based on worst-case lattice problems
- Explicit Hard Instances of the Shortest Vector Problem
- A characterization of chameleon hash functions and new, efficient designs
- Fiat-Shamir with aborts: applications to lattice and factoring-based signatures
- Efficient post-quantum SNARKs for RSIS and RLWE and their applications to privacy
- Making NTRU as secure as worst-case problems over ideal lattices
- Trapdoors for lattices: simpler, tighter, faster, smaller
- Interpreting hash function security proofs
- A toolkit for ring-LWE cryptography
- Improved information set decoding for code-based cryptosystems with constrained memory
- Scalable zero knowledge via cycles of elliptic curves
- Scalable zero knowledge via cycles of elliptic curves
- Post-quantum cryptography: lattice signatures
- CCA updatable encryption against malicious re-encryption attacks
- Towards efficient arithmetic for lattice-based cryptography on reconfigurable hardware
- D-NTRU: more efficient and average-case IND-CPA secure NTRU variant
- Amortized complexity of zero-knowledge proofs revisited: achieving linear soundness slack
- Improved combinatorial algorithms for the inhomogeneous short integer solution problem
This page was built for software: SWIFFT