Saber
From MaRDI portal
Software:36992
swMATH25250MaRDI QIDQ36992FDOQ36992
Author name not available (Why is that?)
Cited In (13)
- Multitarget Decryption Failure Attacks and Their Application to Saber and Kyber
- Implementation of lattice trapdoors on modules and applications
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- BI-NTRU Encryption Schemes: Two New Secure Variants of NTRU
- A novel classical and quantum cryptographic scheme for data encryption
- The matrix reloaded: multiplication strategies in FrodoKEM
- Anonymous, robust post-quantum public key encryption
- Quantum algorithms for variants of average-case lattice problems via filtering
- Number theoretic transform: generalization, optimization, concrete analysis and applications
- Practical post-quantum password-authenticated key exchange based-on module-lattice
- The direction of updatable encryption does not matter much
- Recovery attack on Bob's reused randomness in CRYSTALS-KYBER and SABER
- Rounding in the rings
This page was built for software: Saber