swMATH25250MaRDI QIDQ36992FDOQ36992
Author name not available (Why is that?)
Official website: https://link.springer.com/chapter/10.1007%2F978-3-319-89339-6_16
Cited In (31)
- RLizard
- SIKE
- Implementation of lattice trapdoors on modules and applications
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- A novel classical and quantum cryptographic scheme for data encryption
- Subterranean
- Multitarget decryption failure attacks and their application to Saber and Kyber
- The matrix reloaded: multiplication strategies in FrodoKEM
- Anonymous, robust post-quantum public key encryption
- Quantum algorithms for variants of average-case lattice problems via filtering
- HMQV
- NAXOS
- KEM-DEM
- BKZ
- NTRU
- NTRUEncrypt
- strongSwan
- WalnutDSA
- Falcon
- LEDAkem
- Elligator
- PQM4
- FrodoKEM
- Number theoretic transform: generalization, optimization, concrete analysis and applications
- BIKE
- Practical post-quantum password-authenticated key exchange based-on module-lattice
- LEDAcrypt
- The direction of updatable encryption does not matter much
- Recovery attack on Bob's reused randomness in CRYSTALS-KYBER and SABER
- BI-NTRU encryption schemes: two new secure variants of NTRU
- Rounding in the rings
This page was built for software: Saber