<--- Back to Details
First PageDocument Content
Cryptography / Post-quantum cryptography / Lattice-based cryptography / Computational hardness assumptions / Ring learning with errors / Learning with errors / Digital signature / Hash function / Multivariate random variable / Normal distribution / RSA / Entropy
Date: 2014-01-22 16:26:55
Cryptography
Post-quantum cryptography
Lattice-based cryptography
Computational hardness assumptions
Ring learning with errors
Learning with errors
Digital signature
Hash function
Multivariate random variable
Normal distribution
RSA
Entropy

An improved compression technique for signatures based on learning with errors Shi Bai and Steven D. Galbraith Department of Mathematics, University of Auckland, New Zealand.

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 444,59 KB

Share Document on Facebook

Similar Documents

Cryptography / Multivariate cryptography / Finite fields / Post-quantum cryptography / Hidden Field Equations / Unbalanced Oil and Vinegar / Trapdoor function / XTR / QUAD / Mutation / Digital signature

-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography Jintai Ding1, , Christopher Wolf2 , and Bo-Yin Yang3, 1 University of Cincinnati and Technische Universität Darmstadt

DocID: 1xVV9 - View Document

Cryptography / Post-quantum cryptography / Multivariate cryptography / Finite fields / Lattice-based cryptography / Hidden Field Equations / Learning with errors / QUAD / RSA / Reduction / Computational hardness assumption / Ideal lattice cryptography

Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1 3

DocID: 1xVNp - View Document

Cryptography / Computational complexity theory / Theory of computation / Randomized algorithms / Complexity classes / Zero-knowledge proof / Interactive proof system / Quantum complexity theory / NP / IP / Soundness / Computational indistinguishability

ECE/CS498: Applied Cryptography Instructor: Andrew Miller, TA: Kevin Liao Lecture 2: Interactive Proofs 1

DocID: 1xVMd - View Document

Cryptography / Proof theory / Computational complexity theory / Zero-knowledge proof / Complexity classes / Soundness / IP / Zero knowledge / Interactive proof system / PSPACE / Mathematical proof / Proof of knowledge

The Art of Cryptography Zero Knowledge Proofs Abhiram Kothapalli Two Balls and the Color-Blind Friend

DocID: 1xVLd - View Document

Cryptography / Multivariate cryptography / Post-quantum cryptography / Algebra / Polynomials / Unbalanced Oil and Vinegar / Hidden Field Equations / Algebraic equation / QUAD / Variable / Equation / Finite field

Multivariate Cryptography Louis Goubin, Versailles St-Quentin-en-Yvelines University, France, Jacques Patarin, Versailles St-Quentin-en-Yvelines University, France, and Bo-Yin Yang, Institute of Information Science, Acad

DocID: 1xVDQ - View Document