ring-LWE
From MaRDI portal
Software:30859
No author found.
Source code repository: https://github.com/CMMayer/Toolkit-for-Ring-LWE-v1.0
Related Items (46)
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model ⋮ Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography ⋮ Efficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to Privacy ⋮ Homomorphic Encryption Standard ⋮ Asymptotically quasi-optimal cryptography ⋮ Bootstrapping for helib ⋮ Properties of constacyclic codes under the Schur product ⋮ Post-quantum online voting scheme ⋮ Asymptotically efficient lattice-based digital signatures ⋮ On the hardness of module learning with errors with short distributions ⋮ Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps ⋮ The linear transformation that relates the canonical and coefficient embeddings of ideals in cyclotomic integer rings ⋮ The closest vector problem in tensored root lattices of type A and in their duals ⋮ Improving speed and security in updatable encryption schemes ⋮ Simpler statistically sender private oblivious transfer from ideals of cyclotomic integers ⋮ Bootstrapping for BGV and BFV revisited ⋮ Ring-based identity based encryption -- asymptotically shorter MPK and tighter security ⋮ A Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$ ⋮ On the Scaled Inverse of $(x^i-x^j)$ modulo Cyclotomic Polynomial of the form $\Phi_{p^s}(x)$ or $\Phi_{p^s q^t}(x)$ ⋮ LP Solutions of Vectorial Integer Subset Sums – Cryptanalysis of Galbraith’s Binary Matrix LWE ⋮ Provably Secure NTRU Instances over Prime Cyclotomic Rings ⋮ Computing Generator in Cyclotomic Integer Rings ⋮ Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE ⋮ On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL ⋮ A Toolkit for Ring-LWE Cryptography ⋮ Discretisation and product distributions in ring-LWE ⋮ (In)security of ring-LWE under partial key exposure ⋮ Towards a ring analogue of the leftover hash lemma ⋮ Adaptive Security with Quasi-Optimal Rate ⋮ Tighter security proofs for GPV-IBE in the quantum random oracle model ⋮ Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices ⋮ Sampling from discrete Gaussians for lattice-based cryptography on a constrained device ⋮ Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes ⋮ The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs ⋮ How (Not) to Instantiate Ring-LWE ⋮ Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE ⋮ Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes ⋮ Chosen-ciphertext lattice-based public key encryption with equality test in standard model ⋮ Quantum Hardness of Learning Shallow Classical Circuits ⋮ A new Gaussian sampling for trapdoor lattices with arbitrary modulus ⋮ Algebraic Aspects of Solving Ring-LWE, Including Ring-Based Improvements in the Blum--Kalai--Wasserman Algorithm ⋮ Rounding in the rings ⋮ Efficient pseudorandom correlation generators from ring-LPN ⋮ A new post-quantum multivariate polynomial public key encapsulation algorithm ⋮ Worst-case to average-case reductions for module lattices ⋮ Implementation of lattice trapdoors on modules and applications
This page was built for software: ring-LWE