ring-LWE
From MaRDI portal
Software:30859
swMATH19028MaRDI QIDQ30859FDOQ30859
Author name not available (Why is that?)
Source code repository: https://github.com/CMMayer/Toolkit-for-Ring-LWE-v1.0
Cited In (46)
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE
- Algebraic aspects of solving ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm
- A new Gaussian sampling for trapdoor lattices with arbitrary modulus
- Provably secure NTRU instances over prime cyclotomic rings
- Post-quantum online voting scheme
- Implementation of lattice trapdoors on modules and applications
- Homomorphic Encryption Standard
- How (not) to instantiate ring-LWE
- Computing generator in cyclotomic integer rings. A subfield algorithm for the principal ideal problem in \(L_{|\varDelta_\mathbb {K}|}\left(\frac{1}{2}\right)\) and application to the cryptanalysis of a FHE scheme
- A new post-quantum multivariate polynomial public key encapsulation algorithm
- On the scaled inverse of \((x^i-x^j)\) modulo cyclotomic polynomial of the form \(\Phi_{p^s}(x)\) or \(\Phi_{p^s q^t}(x)\)
- Homomorphic evaluation of lattice-based symmetric encryption schemes
- Discretisation and product distributions in ring-LWE
- Towards a ring analogue of the leftover hash lemma
- Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices
- Quantum hardness of learning shallow classical circuits
- Adaptive security with quasi-optimal rate
- Tighter security proofs for GPV-IBE in the quantum random oracle model
- Sampling from discrete Gaussians for lattice-based cryptography on a constrained device
- Bootstrapping for helib
- LP solutions of vectorial integer subset sums -- cryptanalysis of Galbraith's binary matrix LWE
- Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps
- Improved discrete Gaussian and Subgaussian analysis for lattice cryptography
- Asymptotically quasi-optimal cryptography
- Ring-based identity based encryption -- asymptotically shorter MPK and tighter security
- On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL
- Efficient pseudorandom correlation generators from ring-LPN
- A practical post-quantum public-key cryptosystem based on spLWE
- On the hardness of module learning with errors with short distributions
- Efficient post-quantum SNARKs for RSIS and RLWE and their applications to privacy
- The whole is less than the sum of its parts: constructing more efficient lattice-based AKEs
- Properties of constacyclic codes under the Schur product
- A toolkit for ring-LWE cryptography
- (In)security of ring-LWE under partial key exposure
- Bootstrapping for BGV and BFV revisited
- The closest vector problem in tensored root lattices of type A and in their duals
- Chosen-ciphertext lattice-based public key encryption with equality test in standard model
- Improving speed and security in updatable encryption schemes
- Simpler statistically sender private oblivious transfer from ideals of cyclotomic integers
- Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE
- Asymptotically efficient lattice-based digital signatures
- Worst-case to average-case reductions for module lattices
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
- PAKEs: new framework, new techniques and more efficient lattice-based constructions in the standard model
- The linear transformation that relates the canonical and coefficient embeddings of ideals in cyclotomic integer rings
- Rounding in the rings
This page was built for software: ring-LWE