41![A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-Sparse Representations of Short Lattice Vectors ? ?? Dan Ding1 , Guizhen Zhu2 , Yang Yu1 , Zhongxiang Zheng1 1 Department of Computer Science and Tech A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-Sparse Representations of Short Lattice Vectors ? ?? Dan Ding1 , Guizhen Zhu2 , Yang Yu1 , Zhongxiang Zheng1 1 Department of Computer Science and Tech](https://www.pdfsearch.io/img/dd25878fd9f304a9e2a7f96fb0c96ff8.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2014-12-04 01:20:06
|
---|
42![Better Key Sizes (and Attacks) for LWE-Based Encryption Richard Lindner∗ Chris Peikert† Better Key Sizes (and Attacks) for LWE-Based Encryption Richard Lindner∗ Chris Peikert†](https://www.pdfsearch.io/img/4381715a7416ba10a78af8ee493d4c5f.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2010-11-30 13:28:50
|
---|
43![Attribute-Based Functional Encryption on Lattices (Extended Abstract) Xavier Boyen December 31, 2012 Attribute-Based Functional Encryption on Lattices (Extended Abstract) Xavier Boyen December 31, 2012](https://www.pdfsearch.io/img/18335ccb52805293d751a6962214e41e.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2012-12-31 10:07:10
|
---|
44![Practical Lattice-based Digital Signature Schemes NIST Workshop on Cybersecurity in a Post-Quantum World J. Howe, T. Pöppelmann, M. O’Neill, E. O’Sullivan, T. Güneysu, V. Lyubashevsky Practical Lattice-based Digital Signature Schemes NIST Workshop on Cybersecurity in a Post-Quantum World J. Howe, T. Pöppelmann, M. O’Neill, E. O’Sullivan, T. Güneysu, V. Lyubashevsky](https://www.pdfsearch.io/img/cce90e866b4d30e58e9b85f1997d2be1.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2015-04-03 13:38:18
|
---|
45![Exploiting Poor Randomness: Lattice-Based Techniques Nadia Heninger University of Pennsylvania October 16, 2014 Exploiting Poor Randomness: Lattice-Based Techniques Nadia Heninger University of Pennsylvania October 16, 2014](https://www.pdfsearch.io/img/310203cd7b29dcb70139739256951af7.jpg) | Add to Reading ListSource URL: attackschool.di.uminho.ptLanguage: English - Date: 2014-11-03 05:59:17
|
---|
46![Professor Ravi Sandhu University of Texas at San Antonio Executive Director and Founder, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security Professor of Computer Science, College of Sciences www.p Professor Ravi Sandhu University of Texas at San Antonio Executive Director and Founder, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security Professor of Computer Science, College of Sciences www.p](https://www.pdfsearch.io/img/d4813356085e714606679c89838bf9df.jpg) | Add to Reading ListSource URL: www.profsandhu.comLanguage: English - Date: 2013-10-09 14:40:49
|
---|
47![Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures Dan Boneh and David Mandell Freeman Stanford University, USA Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures Dan Boneh and David Mandell Freeman Stanford University, USA](https://www.pdfsearch.io/img/4d4be6fc7ffb2ea9b13cea5958cff00b.jpg) | Add to Reading ListSource URL: theory.stanford.eduLanguage: English - Date: 2011-04-01 18:52:46
|
---|
48![Functional Encryption for Inner Product Predicates from Learning with Errors Shweta Agrawal∗ University of California, Los Angeles, USA [removed] Functional Encryption for Inner Product Predicates from Learning with Errors Shweta Agrawal∗ University of California, Los Angeles, USA [removed]](https://www.pdfsearch.io/img/a48ff277df3b82792d57631cff11abb1.jpg) | Add to Reading ListSource URL: theory.stanford.eduLanguage: English - Date: 2011-09-02 00:42:27
|
---|
49![Nadia Heninger +[removed]Computer & Information Science Department University of Pennsylvania 3330 Walnut St. Philadelphia, PA[removed] Nadia Heninger +[removed]Computer & Information Science Department University of Pennsylvania 3330 Walnut St. Philadelphia, PA[removed]](https://www.pdfsearch.io/img/b0fd35edec51408ce188933bc445e636.jpg) | Add to Reading ListSource URL: www.cis.upenn.eduLanguage: English - Date: 2014-02-25 14:14:07
|
---|
50![Lattice-based Fault Attacks on DSA - Another Possible Strategy Lattice-based Fault Attacks on DSA - Another Possible Strategy](https://www.pdfsearch.io/img/1f2941bbc4927de5e8b01cba3e8953e3.jpg) | Add to Reading ListSource URL: crypto.hyperlink.czLanguage: English - Date: 2005-08-29 10:42:00
|
---|