Eprint

Results: 2085



#Item
41Cryptography / Mathematics / Algebra / Post-quantum cryptography / Lattice-based cryptography / Linear algebra / Lattice points / Lattice reduction / Lattice / Crystal structure / GramSchmidt process / Lattice problem

Measuring, simulating and exploiting the head concavity phenomenon in BKZ Shi Bai1 , Damien Stehl´e2 , and Weiqiang Wen2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-09-11 03:08:31
42Cryptography / Public-key cryptography / Elliptic curve cryptography / Key management / Digital Signature Standard / Digital signature / Key / Post-quantum cryptography / EdDSA / RSA / Model theory / Digital Signature Algorithm

Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation? David Derler1 , Sebastian Ramacher1 , and Daniel Slamanig2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-08-28 04:23:05
43Algebra / Abstract algebra / Mathematics / Lie groups / Post-quantum cryptography / Algebraic structures / Lattice-based cryptography / Analytic geometry / Lattice / Field extension / Ring / Order

Characterizing overstretched NTRU attacks Gabrielle De Micheli, Nadia Heninger and Barak Shani University of Pennsylvania Abstract Overstretched NTRU, an NTRU variant with a large modulus, has been used as a building

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-06-25 14:23:34
44Cryptography / Hashing / Search algorithms / Cryptographic hash functions / Error detection and correction / Hash function / Digital signature / Collision resistance / Hash / Trapdoor function / Security of cryptographic hash functions

This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-12-13 06:49:27
45Algebra / Abstract algebra / Pairing-based cryptography / Mathematics / Group theory / Linear algebra / Module theory / Pairing / Weil pairing / Elliptic curve / Proofs of quadratic reciprocity / Basic hypergeometric series

Implementing Pairings at the 192-bit Security Level Diego F. Aranha1 , Laura Fuentes-Casta˜ neda2 , Edward Knapp3 , Alfred 3 Menezes , and Francisco Rodr´ıguez-Henr´ıquez2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-04-25 16:25:57
46Cryptography / Public-key cryptography / Random oracle / Commitment scheme / Universal composability / Optimal asymmetric encryption padding / Digital signature / Cryptographic hash function / Advantage / Oracle machine / Cryptographic protocol / Oracle Database

The Wonderful World of Global Random Oracles Jan Camenisch1 , Manu Drijvers1,2 , Tommaso Gagliardoni1 , Anja Lehmann1 , and Gregory Neven1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-02-08 17:16:08
47Cryptography / Public-key cryptography / Digital signature / Signcryption / Key / ID-based encryption / RSA / Encryption

A preliminary version of this paper appears in the proceedings of EurocryptThis is the full version, which appears as IACR ePrint Archive RecordKey-Versatile Signatures and Applications: RKA, KDM and Jo

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
48Abstract algebra / Algebra / Cryptography / Group theory / Finite fields / Logarithms / Elliptic curve cryptography / Public-key cryptography / Index calculus algorithm / Elliptic-curve cryptography / Discrete logarithm / Random walk

The Proof is in the Pudding Proofs of Work for Solving Discrete Logarithms Marcella Hastings1 , Nadia Heninger1 , and Eric Wustrow2 1 University of Pennsylvania

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-10-05 10:39:17
49Algebra / Mathematics / Polynomials / Computer algebra / Integer factorization algorithms / Finite fields / Special number field sieve / General number field sieve / Irreducible polynomial / Discrete logarithm / Factorization / Resultant

Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography Alfred Menezes1 , Palash Sarkar2 , and Shashank Singh3 1 Department of Combinatorics & Optimization, University of Water

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-12-27 11:29:50
50Cryptography / Post-quantum cryptography / Lattice-based cryptography / Models of computation / Homeomorphisms / Homomorphic encryption / Quantum computing / Lattice / Learning with errors / RSA / One-time pad / Quantum circuit

Quantum FHE (Almost) As Secure as Classical Zvika Brakerski∗ Abstract Fully homomorphic encryption schemes (FHE) allow to apply arbitrary efficient computation to encrypted data without decrypting it first. In Quantum

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-04-10 03:50:18
UPDATE