<--- Back to Details
First PageDocument Content
Cryptography / Post-quantum cryptography / Ciphertext indistinguishability / Ring learning with errors / Chosen-plaintext attack / Learning with errors / Advantage / Lattice-based cryptography / Chosen-ciphertext attack / Digital signature / Ideal lattice cryptography / Semantic security
Date: 2018-07-25 08:38:21
Cryptography
Post-quantum cryptography
Ciphertext indistinguishability
Ring learning with errors
Chosen-plaintext attack
Learning with errors
Advantage
Lattice-based cryptography
Chosen-ciphertext attack
Digital signature
Ideal lattice cryptography
Semantic security

CRYSTALS – Kyber: a CCA-secure module-lattice-based KEM Joppe Bos∗ , Léo Ducas† , Eike Kiltz‡ , Tancrède Lepoint§ , Vadim Lyubashevsky¶ , John M. Schanckk , Peter Schwabe∗∗ , Gregor Seiler†† , Damien

Add to Reading List

Source URL: cryptojedi.org

Download Document from Source Website

File Size: 450,18 KB

Share Document on Facebook

Similar Documents

Parallel Implementation of BDD enumeration for LWE Elena Kirshanova, Alexander May, Friedrich Wiemer Horst G¨ ortz Institute for IT-Security Faculty of Mathematics

Parallel Implementation of BDD enumeration for LWE Elena Kirshanova, Alexander May, Friedrich Wiemer Horst G¨ ortz Institute for IT-Security Faculty of Mathematics

DocID: 1pJyl - View Document

Post-quantum key exchange – a new hope Erdem Alkim1 , Léo Ducas2 , Thomas Pöppelmann3 , and Peter Schwabe4 ?  1

Post-quantum key exchange – a new hope Erdem Alkim1 , Léo Ducas2 , Thomas Pöppelmann3 , and Peter Schwabe4 ? 1

DocID: 1pFRC - View Document

Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes Massimo Chenal Qiang Tang

Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes Massimo Chenal Qiang Tang

DocID: 1kQdy - View Document

Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices Jonathan Katz1? and Vinod Vaikuntanathan2 1  University of Maryland

Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices Jonathan Katz1? and Vinod Vaikuntanathan2 1 University of Maryland

DocID: 1gx7z - View Document