<--- Back to Details
First PageDocument Content
Cryptography / Post-quantum cryptography / Multivariate cryptography / Finite fields / Lattice-based cryptography / Hidden Field Equations / Learning with errors / QUAD / RSA / Reduction / Computational hardness assumption / Ideal lattice cryptography
Date: 2012-04-04 23:26:12
Cryptography
Post-quantum cryptography
Multivariate cryptography
Finite fields
Lattice-based cryptography
Hidden Field Equations
Learning with errors
QUAD
RSA
Reduction
Computational hardness assumption
Ideal lattice cryptography

Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1 3

Add to Reading List

Source URL: precision.moscito.org

Download Document from Source Website

File Size: 261,61 KB

Share Document on Facebook

Similar Documents

An improved compression technique for signatures based on learning with errors Shi Bai and Steven D. Galbraith Department of Mathematics, University of Auckland, New Zealand.

An improved compression technique for signatures based on learning with errors Shi Bai and Steven D. Galbraith Department of Mathematics, University of Auckland, New Zealand.

DocID: 1xTLZ - View Document

Practical post-quantum key exchange from the Learning with Errors Problem

Practical post-quantum key exchange from the Learning with Errors Problem

DocID: 1vdCU - View Document

Quantum computers and factoring Learning with errors Cryptography from LWE From linear algebra to post-quantum cryptography

Quantum computers and factoring Learning with errors Cryptography from LWE From linear algebra to post-quantum cryptography

DocID: 1uiVi - View Document

FrodoKEM Learning With Errors Key Encapsulation Algorithm Specifications And Supporting Documentation November 30,

FrodoKEM Learning With Errors Key Encapsulation Algorithm Specifications And Supporting Documentation November 30,

DocID: 1tCj6 - View Document

Interpolating Predicate and Functional Encryption from Learning With Errors Shweta Agrawal ∗

Interpolating Predicate and Functional Encryption from Learning With Errors Shweta Agrawal ∗

DocID: 1taPr - View Document