Pages that link to "Item:Q3073715"
From MaRDI portal
The following pages link to Better Key Sizes (and Attacks) for LWE-Based Encryption (Q3073715):
Displaying 50 items.
- Polly cracker, revisited (Q285245) (← links)
- Homomorphic AES evaluation using the modified LTV scheme (Q310240) (← links)
- Sampling from discrete Gaussians for lattice-based cryptography on a constrained device (Q742507) (← links)
- Dual lattice attacks for closest vector problems (with preprocessing) (Q826277) (← links)
- Towards post-quantum security for signal's X3DH handshake (Q832361) (← links)
- Secret computation of purchase history data using somewhat homomorphic encryption (Q890595) (← links)
- Lattice-based key exchange on small integer solution problem (Q1616180) (← links)
- Lattice-based certificateless encryption scheme (Q1633051) (← links)
- Fiat-Shamir and correlation intractability from strong KDM-secure encryption (Q1648782) (← links)
- On the asymptotic complexity of solving LWE (Q1692148) (← links)
- Post-quantum key exchange for the Internet and the open quantum safe project (Q1698609) (← links)
- Analysis of error-correcting codes for lattice-based key exchange (Q1726688) (← links)
- HILA5: on reliability, reconciliation, and error correction for Ring LWE encryption (Q1746967) (← links)
- A public-key encryption scheme based on non-linear indeterminate equations (Q1746969) (← links)
- The polynomial approximate common divisor problem and its application to the fully homomorphic encryption (Q1750401) (← links)
- Enhancing Goldreich, Goldwasser and Halevi's scheme with intersecting lattices (Q2009415) (← links)
- Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes (Q2055683) (← links)
- LWE from non-commutative group rings (Q2068391) (← links)
- LWE with side information: attacks and concrete security estimation (Q2096528) (← links)
- An optimized GHV-type HE scheme: simpler, faster, and more versatile (Q2096603) (← links)
- Revocable hierarchical identity-based authenticated key exchange (Q2104408) (← links)
- Faster homomorphic encryption over GPGPUs via hierarchical DGT (Q2147259) (← links)
- Attribute-based conditional proxy re-encryption in the standard model under LWE (Q2148755) (← links)
- On the higher-bit version of approximate inhomogeneous short integer solution problem (Q2149828) (← links)
- Making the BKW algorithm practical for LWE (Q2152043) (← links)
- On a dual/hybrid approach to small secret LWE. A dual/enumeration technique for learning with errors and application to security estimates of FHE schemes (Q2152045) (← links)
- Security of public key encryption against resetting attacks (Q2152048) (← links)
- Vandermonde meets Regev: public key encryption schemes based on partial Vandermonde problems (Q2161427) (← links)
- Tightly secure ring-LWE based key encapsulation with short ciphertexts (Q2167708) (← links)
- A Ring-LWE-based digital signature inspired by Lindner-Peikert scheme (Q2168799) (← links)
- The polynomial learning with errors problem and the smearing condition (Q2168804) (← links)
- \(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryption (Q2170018) (← links)
- Anonymous, robust post-quantum public key encryption (Q2170096) (← links)
- New techniques for SIDH-based NIKE (Q2191209) (← links)
- On the complexity of the BKW algorithm on LWE (Q2256097) (← links)
- A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack (Q2415416) (← links)
- Estimation of the hardness of the learning with errors problem with a restricted number of samples (Q2415419) (← links)
- An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption (Q2629405) (← links)
- Predicting the concrete security of LWE against the dual attack using binary search (Q2673056) (← links)
- On the hardness of module learning with errors with short distributions (Q2677644) (← links)
- Scalable ciphertext compression techniques for post-quantum KEMs and their applications (Q2692345) (← links)
- Estimating quantum speedups for lattice sieves (Q2692396) (← links)
- Secret handshakes: full dynamicity, deniability and lattice-based design (Q2699945) (← links)
- Post-Quantum Forward-Secure Onion Routing (Q2794504) (← links)
- Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM (Q2799094) (← links)
- Post-Quantum Cryptography: State of the Art (Q2803619) (← links)
- Lattice-based identity-based resplittable threshold public key encryption scheme (Q2804886) (← links)
- Parallel Implementation of BDD Enumeration for LWE (Q2822698) (← links)
- How (Not) to Instantiate Ring-LWE (Q2827731) (← links)
- Semantic Security and Indistinguishability in the Quantum World (Q2829943) (← links)