Lattice problem

Results: 184



#Item
51Abstract algebra / Lattice problem / Lattice / Learning with errors / Vector space / Lenstra–Lenstra–Lovász lattice basis reduction algorithm / Lattice-based cryptography / Algebra / Mathematics / Cryptography

The nc-Unique Shortest Vector Problem is Hard Vadim Lyubashevsky∗ Abstract The unique Shortest Vector Problem (uSVP) gained prominence because it was the problem upon which the first provably-secure lattice-based crypt

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-01 09:32:36
52Lattice points / Cryptography / Computational number theory / Linear algebra / Quadratic forms / Lattice problem / Lattice reduction / Lattice / Lenstra–Lenstra–Lovász lattice basis reduction algorithm / Algebra / Mathematics / Abstract algebra

A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-Sparse Representations of Short Lattice Vectors ? ?? Dan Ding1 , Guizhen Zhu2 , Yang Yu1 , Zhongxiang Zheng1 1 Department of Computer Science and Tech

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-04 01:20:06
53Cryptography / Lattice points / Linear algebra / Computational number theory / Lattice problem / Lattice / Lenstra–Lenstra–Lovász lattice basis reduction algorithm / Vector space / Algebra / Mathematics / Abstract algebra

Solving the Shortest Lattice Vector Problem in Time 22.465n Xavier Pujol1 and Damien Stehl´e2 1 Universit´e de Lyon, Laboratoire LIP, CNRS-ENSL-INRIA-UCBL, 46 All´ee d’Italie, 69364 Lyon Cedex 07, France 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-02-08 02:45:52
54Learning with errors / Lattice problem / Normal distribution / Lattice / Vector space / Ideal lattice cryptography / Algebra / Mathematics / Cryptography

Lattice Decoding Attacks on Binary LWE Shi Bai and Steven D. Galbraith Department of Mathematics, University of Auckland, New Zealand.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-04-24 04:32:29
55Cryptography / Lattice points / Computational number theory / Linear algebra / Lattice problem / Lattice / Normal distribution / Lenstra–Lenstra–Lovász lattice basis reduction algorithm / Vector space / Mathematics / Algebra / Abstract algebra

Improved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector Problem ? Xiaoyun Wang1,2 , Mingjie Liu1 , Chengliang Tian2 and Jingguo Bi2 1 Institute for Advanced Study, Tsinghua University, Beijing, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-08-28 09:14:48
56Lattice problem / Learning with errors / Lattice / Public-key cryptography / Cipher / Symmetric-key algorithm / Semantic security / GGH encryption scheme / Ideal lattice cryptography / Cryptography / Lattice-based cryptography / Homomorphic encryption

Attribute-Based Functional Encryption on Lattices (Extended Abstract) Xavier Boyen December 31, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-31 10:07:10
57Polynomial / ElGamal encryption / NTRUEncrypt / Ideal lattice cryptography / Cryptography / Lattice problem / One-way function

Proposal of a new efficient public key system for encryption and digital signatures Gerold Gr¨ unauer Email:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-11-27 12:23:14
58Algebra / Computational number theory / Graphics hardware / GPGPU / Cryptography / Lattice problem / Lattice reduction / Lenstra–Lenstra–Lovász lattice basis reduction algorithm / Lattice / Mathematics / Lattice points / Applied mathematics

Parallel Shortest Lattice Vector Enumeration on Graphics Cards? Jens Hermans ??1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-02-26 11:26:24
59NTRUSign / Lattice-based cryptography / NTRU / Lattice problem / RSA / Lattice / Digital signature / Learning with errors / Ideal lattice cryptography / Cryptography / Post-quantum cryptography / Public-key cryptography

Practical Lattice-based Digital Signature Schemes NIST Workshop on Cybersecurity in a Post-Quantum World J. Howe, T. Pöppelmann, M. O’Neill, E. O’Sullivan, T. Güneysu, V. Lyubashevsky

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 13:38:18
60McEliece cryptosystem / Post-quantum cryptography / Ciphertext / Chosen-ciphertext attack / RSA / Lattice problem / Cryptanalysis / Niederreiter cryptosystem / Rabin cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Reaction Attacks Against Several Public-Key Cryptosystems Chris Hall1 , Ian Goldberg2 , and Bruce Schneier1 1 Counterpane Systems

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
UPDATE