ring-LWE

From MaRDI portal
Software:30859



swMATH19028MaRDI QIDQ30859


No author found.

Source code repository: https://github.com/CMMayer/Toolkit-for-Ring-LWE-v1.0




Related Items (46)

PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard ModelImproved Discrete Gaussian and Subgaussian Analysis for Lattice CryptographyEfficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to PrivacyHomomorphic Encryption StandardAsymptotically quasi-optimal cryptographyBootstrapping for helibProperties of constacyclic codes under the Schur productPost-quantum online voting schemeAsymptotically efficient lattice-based digital signaturesOn the hardness of module learning with errors with short distributionsPartitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear MapsThe linear transformation that relates the canonical and coefficient embeddings of ideals in cyclotomic integer ringsThe closest vector problem in tensored root lattices of type A and in their dualsImproving speed and security in updatable encryption schemesSimpler statistically sender private oblivious transfer from ideals of cyclotomic integersBootstrapping for BGV and BFV revisitedRing-based identity based encryption -- asymptotically shorter MPK and tighter securityA Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$On the Scaled Inverse of $(x^i-x^j)$ modulo Cyclotomic Polynomial of the form $\Phi_{p^s}(x)$ or $\Phi_{p^s q^t}(x)$LP Solutions of Vectorial Integer Subset Sums – Cryptanalysis of Galbraith’s Binary Matrix LWEProvably Secure NTRU Instances over Prime Cyclotomic RingsComputing Generator in Cyclotomic Integer RingsConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWEOn Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEALA Toolkit for Ring-LWE CryptographyDiscretisation and product distributions in ring-LWE(In)security of ring-LWE under partial key exposureTowards a ring analogue of the leftover hash lemmaAdaptive Security with Quasi-Optimal RateTighter security proofs for GPV-IBE in the quantum random oracle modelTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesSampling from discrete Gaussians for lattice-based cryptography on a constrained deviceHomomorphic Evaluation of Lattice-Based Symmetric Encryption SchemesThe Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEsHow (Not) to Instantiate Ring-LWEThree’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWEProgrammable Hash Functions from Lattices: Short Signatures and IBEs with Small Key SizesChosen-ciphertext lattice-based public key encryption with equality test in standard modelQuantum Hardness of Learning Shallow Classical CircuitsA new Gaussian sampling for trapdoor lattices with arbitrary modulusAlgebraic Aspects of Solving Ring-LWE, Including Ring-Based Improvements in the Blum--Kalai--Wasserman AlgorithmRounding in the ringsEfficient pseudorandom correlation generators from ring-LPNA new post-quantum multivariate polynomial public key encapsulation algorithmWorst-case to average-case reductions for module latticesImplementation of lattice trapdoors on modules and applications


This page was built for software: ring-LWE