The following pages link to FrodoKEM (Q46969):
Displayed 25 items.
- Item:Q46969 (redirect page) (← links)
- Key mismatch attack on ThreeBears, Frodo and Round5 (Q831649) (← links)
- Towards post-quantum security for signal's X3DH handshake (Q832361) (← links)
- On the asymptotic complexity of solving LWE (Q1692148) (← links)
- Assessing the feasibility of single trace power analysis of Frodo (Q1726676) (← links)
- DAGS: key encapsulation using dyadic GS codes (Q1755960) (← links)
- A framework for cryptographic problems from linear algebra (Q2023808) (← links)
- Verifying solutions to LWE with implications for concrete security (Q2025364) (← links)
- Limits on the efficiency of (ring) LWE-based non-interactive key exchange (Q2051406) (← links)
- Lower bounds on lattice sieving and information set decoding (Q2128585) (← links)
- Shortest vectors in lattices of Bai-Galbraith's embedding attack on the LWR problem (Q2128750) (← links)
- A novel classical and quantum cryptographic scheme for data encryption (Q2129029) (← links)
- Universal product learning with errors: a new variant of \textsf{LWE} for lattice-based cryptography (Q2143125) (← links)
- The matrix reloaded: multiplication strategies in FrodoKEM (Q2149815) (← links)
- Anonymous, robust post-quantum public key encryption (Q2170096) (← links)
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification (Q2232597) (← links)
- Practical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiency (Q2334442) (← links)
- Strongly leakage resilient authenticated key exchange, revisited (Q2334443) (← links)
- Algebraic generalization of Diffie-Hellman key exchange (Q2413287) (← links)
- Comparison analysis of Ding's RLWE-based key exchange protocol and NewHope variants (Q2415387) (← links)
- Estimation of the hardness of the learning with errors problem with a restricted number of samples (Q2415419) (← links)
- A note on the concrete hardness of the shortest independent vector in lattices (Q2656338) (← links)
- Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting (Q3297618) (← links)
- (Q5083085) (← links)
- (Q5240427) (← links)