The following pages link to ring-LWE (Q30859):
Displaying 31 items.
- Sampling from discrete Gaussians for lattice-based cryptography on a constrained device (Q742507) (← links)
- The closest vector problem in tensored root lattices of type A and in their duals (Q1692156) (← links)
- Discretisation and product distributions in ring-LWE (Q2027267) (← links)
- (In)security of ring-LWE under partial key exposure (Q2027270) (← links)
- Towards a ring analogue of the leftover hash lemma (Q2027271) (← links)
- Chosen-ciphertext lattice-based public key encryption with equality test in standard model (Q2072076) (← links)
- Rounding in the rings (Q2096527) (← links)
- Efficient pseudorandom correlation generators from ring-LPN (Q2096531) (← links)
- A new post-quantum multivariate polynomial public key encapsulation algorithm (Q2102772) (← links)
- Implementation of lattice trapdoors on modules and applications (Q2118540) (← links)
- Asymptotically quasi-optimal cryptography (Q2170004) (← links)
- Properties of constacyclic codes under the Schur product (Q2182071) (← links)
- A new Gaussian sampling for trapdoor lattices with arbitrary modulus (Q2329396) (← links)
- Worst-case to average-case reductions for module lattices (Q2345928) (← links)
- Asymptotically efficient lattice-based digital signatures (Q2413615) (← links)
- Bootstrapping for helib (Q2661696) (← links)
- Post-quantum online voting scheme (Q2670852) (← links)
- On the hardness of module learning with errors with short distributions (Q2677644) (← links)
- Improving speed and security in updatable encryption schemes (Q2691598) (← links)
- Simpler statistically sender private oblivious transfer from ideals of cyclotomic integers (Q2692389) (← links)
- Bootstrapping for BGV and BFV revisited (Q2697680) (← links)
- Ring-based identity based encryption -- asymptotically shorter MPK and tighter security (Q2697891) (← links)
- Adaptive Security with Quasi-Optimal Rate (Q2796140) (← links)
- Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes (Q2817869) (← links)
- The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs (Q2827724) (← links)
- How (Not) to Instantiate Ring-LWE (Q2827731) (← links)
- Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE (Q2829234) (← links)
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes (Q2829951) (← links)
- Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps (Q2953793) (← links)
- A Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$ (Q2988333) (← links)
- On the Scaled Inverse of $(x^i-x^j)$ modulo Cyclotomic Polynomial of the form $\Phi_{p^s}(x)$ or $\Phi_{p^s q^t}(x)$ (Q5074074) (← links)