Pages that link to "Item:Q2936597"
From MaRDI portal
The following pages link to Efficient Identity-Based Encryption over NTRU Lattices (Q2936597):
Displaying 48 items.
- SoK: how (not) to design and implement post-quantum cryptography (Q826276) (← links)
- Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures (Q1698622) (← links)
- A full RNS variant of FV like somewhat homomorphic encryption schemes (Q1698661) (← links)
- Provably secure NTRUEncrypt over any cyclotomic field (Q1726689) (← links)
- A framework for cryptographic problems from linear algebra (Q2023808) (← links)
- Key recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU lattices (Q2055645) (← links)
- A non-PCP approach to succinct quantum-safe zero-knowledge (Q2096535) (← links)
- Implementation of lattice trapdoors on modules and applications (Q2118540) (← links)
- Integral matrix Gram root and lattice Gaussian sampling without floats (Q2119026) (← links)
- Gadget-based iNTRU lattice trapdoors (Q2152053) (← links)
- \textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon} (Q2170090) (← links)
- D-NTRU: more efficient and average-case IND-CPA secure NTRU variant (Q2195452) (← links)
- Modular lattice signatures, revisited (Q2302153) (← links)
- Lattice-based revocable certificateless signature (Q2333434) (← links)
- Survey of information security (Q2385398) (← links)
- Scalable revocable identity-based signature over lattices in the standard model (Q2662710) (← links)
- A novel identity-based multi-signature scheme over NTRU lattices (Q2676475) (← links)
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors (Q2692341) (← links)
- The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs (Q2827724) (← links)
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes (Q2829951) (← links)
- High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers (Q2946459) (← links)
- Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps (Q2953793) (← links)
- Identity-Based Blind Signature from Lattices in Standard Model (Q2980856) (← links)
- Algorithms for the Generalized NTRU Equations and their Storage Analysis (Q4988919) (← links)
- Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography (Q5041172) (← links)
- Isochronous Gaussian Sampling: From Inception to Implementation (Q5041213) (← links)
- Compact Privacy Protocols from Post-quantum and Timed Classical Assumptions (Q5041222) (← links)
- COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers (Q5041226) (← links)
- Towards a Simpler Lattice Gadget Toolkit (Q5087269) (← links)
- A Novel Certificateless Multi-signature Scheme over NTRU Lattices (Q5095936) (← links)
- (Q5155336) (← links)
- Provably Secure NTRU Instances over Prime Cyclotomic Rings (Q5738796) (← links)
- Revisiting Lattice Attacks on Overstretched NTRU Parameters (Q5738868) (← links)
- One-Shot Verifiable Encryption from Lattices (Q5738881) (← links)
- LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search (Q6052672) (← links)
- A polynomial time algorithm for breaking NTRU encryption with multiple keys (Q6109713) (← links)
- Lattice-based programmable hash functions and applications (Q6182001) (← links)
- Lattice-based cryptography: a survey (Q6183909) (← links)
- Identity-based encryption from lattices using approximate trapdoors (Q6535489) (← links)
- Lattice-based polynomial commitments: towards asymptotic and concrete efficiency (Q6595849) (← links)
- \textsc{Antrag}: annular NTRU trapdoor generation. Making \textsc{Mitaka} as secure as FALCON (Q6595914) (← links)
- On Gaussian sampling, smoothing parameter and application to signatures (Q6595917) (← links)
- NEV: faster and smaller NTRU encryption using vector decoding (Q6595920) (← links)
- Profiling side-channel attacks on Dilithium. A small bit-fiddling leak breaks it all (Q6619833) (← links)
- Cryptanalysis of the \textsc{Peregrine} lattice-based signature scheme (Q6635758) (← links)
- A refined hardness estimation of LWE in two-step mode (Q6635818) (← links)
- Towards compact identity-based encryption on ideal lattices (Q6636118) (← links)
- Ring signatures for deniable AKEM: Gandalf's fellowship (Q6648196) (← links)