<--- Back to Details
First PageDocument Content
Cryptography / Post-quantum cryptography / Lattice-based cryptography / Public-key cryptography / Key management / Homomorphic encryption / NTRU / Lattice problem / SWIFFT / Cryptographic hash function / Key / Lattice
Date: 2015-09-29 10:45:40
Cryptography
Post-quantum cryptography
Lattice-based cryptography
Public-key cryptography
Key management
Homomorphic encryption
NTRU
Lattice problem
SWIFFT
Cryptographic hash function
Key
Lattice

Lattice Cryptography: A White Paper Daniele Micciancio∗ March 16, 2010 1

Add to Reading List

Source URL: thmatters.files.wordpress.com

Download Document from Source Website

File Size: 69,73 KB

Share Document on Facebook

Similar Documents

Algebra / Abstract algebra / Mathematics / Lie groups / Post-quantum cryptography / Algebraic structures / Lattice-based cryptography / Analytic geometry / Lattice / Field extension / Ring / Order

Characterizing overstretched NTRU attacks Gabrielle De Micheli, Nadia Heninger and Barak Shani University of Pennsylvania Abstract Overstretched NTRU, an NTRU variant with a large modulus, has been used as a building

DocID: 1xTAG - View Document

NTRU Prime: reducing attack surface at low cost Daniel J. Bernstein1 , Chitchanok Chuengsatiansup2 , Tanja Lange3 , and Christine van Vredendaal3 1

DocID: 1viGI - View Document

NTRU Prime Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, and Christine van Vredendaal Technische Universiteit Eindhoven 25 August 2016

DocID: 1vfuq - View Document

A Scalable Implementation of Fully Homomorphic Encryption Built on NTRU∗ Kurt Rohloff David Bruce Cousins Raytheon BBN Technologies 10 Moulton St.

DocID: 1u1LL - View Document

A subfield lattice attack on overstretched NTRU assumptions Cryptanalysis of some FHE and Graded Encoding Schemes Martin Albrecht1? , Shi Bai2?? , and L´eo Ducas3? ? ? 1

DocID: 1t0yC - View Document