![Cryptography / Post-quantum cryptography / Ciphertext indistinguishability / Ring learning with errors / Chosen-plaintext attack / Learning with errors / Advantage / Lattice-based cryptography / Chosen-ciphertext attack / Digital signature / Ideal lattice cryptography / Semantic security Cryptography / Post-quantum cryptography / Ciphertext indistinguishability / Ring learning with errors / Chosen-plaintext attack / Learning with errors / Advantage / Lattice-based cryptography / Chosen-ciphertext attack / Digital signature / Ideal lattice cryptography / Semantic security](https://www.pdfsearch.io/img/ece7288ef326192b54a49bd644d7da3f.jpg) Date: 2018-07-25 08:38:21Cryptography Post-quantum cryptography Ciphertext indistinguishability Ring learning with errors Chosen-plaintext attack Learning with errors Advantage Lattice-based cryptography Chosen-ciphertext attack Digital signature Ideal lattice cryptography Semantic security | | CRYSTALS – Kyber: a CCA-secure module-lattice-based KEM Joppe Bos∗ , Léo Ducas† , Eike Kiltz‡ , Tancrède Lepoint§ , Vadim Lyubashevsky¶ , John M. Schanckk , Peter Schwabe∗∗ , Gregor Seiler†† , Damien Add to Reading ListSource URL: cryptojedi.orgDownload Document from Source Website File Size: 450,18 KBShare Document on Facebook
|