11![Topics in Post-Quantum Cryptography Lattice-Based Methods Jesko H¨ uttenhain Topics in Post-Quantum Cryptography Lattice-Based Methods Jesko H¨ uttenhain](https://www.pdfsearch.io/img/668ce127931a865d90eaace0115d0fd6.jpg) | Add to Reading ListSource URL: www.huettenhain.netLanguage: English |
---|
12![Lattice Signatures and Bimodal Gaussians L´eo Ducas∗ and Alain Durmus∗∗ and Tancr`ede Lepoint† and Vadim Lyubashevsky‡ {Leo.Ducas, Alain.Durmus, Tancrede.Lepoint, Vadim.Lyubashevsky}@ens.fr Abstract. Our main Lattice Signatures and Bimodal Gaussians L´eo Ducas∗ and Alain Durmus∗∗ and Tancr`ede Lepoint† and Vadim Lyubashevsky‡ {Leo.Ducas, Alain.Durmus, Tancrede.Lepoint, Vadim.Lyubashevsky}@ens.fr Abstract. Our main](https://www.pdfsearch.io/img/dcf3f7f6e682e9d81234061c03d29e2b.jpg) | Add to Reading ListSource URL: www.di.ens.frLanguage: English - Date: 2013-09-25 15:09:35
|
---|
13![Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems Tim G¨ uneysu1∗ , Vadim Lyubashevsky2† , and Thomas P¨oppelmann1∗ 1 Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems Tim G¨ uneysu1∗ , Vadim Lyubashevsky2† , and Thomas P¨oppelmann1∗ 1](https://www.pdfsearch.io/img/27dd3f90495e221b4a535864a1018cb9.jpg) | Add to Reading ListSource URL: www.sha.rub.deLanguage: English - Date: 2014-06-12 05:54:41
|
---|
14![Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Shi Bai1 , Adeline Langlois2 , Tancrède Lepoint3 , Damien Stehlé1 , Ron Steinfeld4 1 Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Shi Bai1 , Adeline Langlois2 , Tancrède Lepoint3 , Damien Stehlé1 , Ron Steinfeld4 1](https://www.pdfsearch.io/img/22e92396244dd0c51c940a61e6bbce49.jpg) | Add to Reading ListSource URL: perso.ens-lyon.frLanguage: English - Date: 2015-06-15 17:19:13
|
---|
15![Lattice Cryptography for the Internet Chris Peikert∗ July 16, 2014 Abstract In recent years, lattice-based cryptography has been recognized for its many attractive properties, such Lattice Cryptography for the Internet Chris Peikert∗ July 16, 2014 Abstract In recent years, lattice-based cryptography has been recognized for its many attractive properties, such](https://www.pdfsearch.io/img/f86328565c0a231dff93fdcbd16013ca.jpg) | Add to Reading ListSource URL: web.eecs.umich.eduLanguage: English - Date: 2015-09-08 16:32:09
|
---|
16![Lattice-Based Cryptography: Mathematical and Computational Background Chris Peikert Georgia Institute of Technology crypt@b-it 2013 Lattice-Based Cryptography: Mathematical and Computational Background Chris Peikert Georgia Institute of Technology crypt@b-it 2013](https://www.pdfsearch.io/img/34f7ac8174c26283fe63ed1cde006ea4.jpg) | Add to Reading ListSource URL: web.eecs.umich.eduLanguage: English - Date: 2015-09-08 16:32:03
|
---|
17![Lattice-Based Cryptography: Constructing Trapdoors and More Applications Chris Peikert Georgia Institute of Technology crypt@b-it 2013 Lattice-Based Cryptography: Constructing Trapdoors and More Applications Chris Peikert Georgia Institute of Technology crypt@b-it 2013](https://www.pdfsearch.io/img/d81685afa6b3ee014dca16adf774c7ca.jpg) | Add to Reading ListSource URL: web.eecs.umich.eduLanguage: English - Date: 2015-09-08 16:32:04
|
---|
18![Session #9: Trapdoors and Applications Chris Peikert Georgia Institute of Technology Winter School on Lattice-Based Cryptography and Applications Session #9: Trapdoors and Applications Chris Peikert Georgia Institute of Technology Winter School on Lattice-Based Cryptography and Applications](https://www.pdfsearch.io/img/0a12b7e2e152c6a14e9b516aec6f0841.jpg) | Add to Reading ListSource URL: web.eecs.umich.eduLanguage: English - Date: 2015-09-08 16:32:04
|
---|
19![Some Recent Progress in Lattice-Based Cryptography Chris Peikert SRI TCC 2009 Some Recent Progress in Lattice-Based Cryptography Chris Peikert SRI TCC 2009](https://www.pdfsearch.io/img/4f98c3ac14d8ff42a85f1b08db260111.jpg) | Add to Reading ListSource URL: web.eecs.umich.eduLanguage: English - Date: 2015-09-08 16:32:00
|
---|
20![Lattice-Based Cryptography: Ring-Based Primitives and Open Problems Chris Peikert Georgia Institute of Technology crypt@b-it 2013 Lattice-Based Cryptography: Ring-Based Primitives and Open Problems Chris Peikert Georgia Institute of Technology crypt@b-it 2013](https://www.pdfsearch.io/img/09ed11697a99f0231129fc7c80becfde.jpg) | Add to Reading ListSource URL: web.eecs.umich.eduLanguage: English - Date: 2015-09-08 16:32:01
|
---|