Learning with errors

Results: 81



#Item
21

Classical Hardness of Learning with Errors arXiv:1306.0281v1 [cs.CC] 3 Jun 2013 Zvika Brakerski∗

Add to Reading List

Source URL: perso.ens-lyon.fr

Language: English - Date: 2013-06-04 16:18:02
    22

    On Ideal Lattices and Learning with Errors Over Rings∗ Vadim Lyubashevsky† Chris Peikert‡

    Add to Reading List

    Source URL: web.eecs.umich.edu

    Language: English - Date: 2015-09-08 16:32:08
      23

      Session #5: Learning With Errors Chris Peikert Georgia Institute of Technology Winter School on Lattice-Based Cryptography and Applications

      Add to Reading List

      Source URL: web.eecs.umich.edu

      Language: English - Date: 2015-09-08 16:32:02
        24Learning with errors / RSA / Ideal lattice cryptography / Index of cryptography articles / Cryptography / Cryptographic protocols / Password-authenticated key agreement

        Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices Jonathan Katz1? and Vinod Vaikuntanathan2 1 University of Maryland

        Add to Reading List

        Source URL: www.cs.umd.edu

        Language: English - Date: 2009-09-07 10:57:44
        25

        The Journal of Neuroscience, November 5, 2014 • 34(45):14901–14912 • Behavioral/Cognitive Episodic Memory Encoding Interferes with Reward Learning and Decreases Striatal Prediction Errors

        Add to Reading List

        Source URL: shohamylab.psych.columbia.edu

        Language: English - Date: 2014-11-05 17:32:13
          26

          Technical Report TTIC-TRJune 2009 Agnostically Learning Halfspaces with Margin Errors

          Add to Reading List

          Source URL: www.ttic.edu

          Language: English - Date: 2012-09-18 12:01:30
            27Machine learning / AKA / Secure Shell / Perfect forward secrecy / Data / Information / Computing / Cryptography / Cryptographic protocols / Learning with errors

            Post-quantum Authenticated Key Exchange from Ideal Lattices ¨ u¨ r Dagdelen3 Jiang Zhang1 , Zhenfeng Zhang1,∗ , Jintai Ding2,∗ , Michael Snook2 , and Ozg 1 Institute of Software, Chinese Academy of Sciences, China

            Add to Reading List

            Source URL: csrc.nist.gov

            Language: English - Date: 2015-04-09 11:41:32
            28Electronic commerce / Computational hardness assumptions / Hidden Field Equations / Pseudorandom generator / RSA / XTR / Learning with errors / Clique problem / One-way function / Cryptography / Finite fields / Public-key cryptography

            Public-Key Cryptography from Different Assumptions Benny Applebaum∗ Boaz Barak† Avi Wigderson‡

            Add to Reading List

            Source URL: www.boazbarak.org

            Language: English - Date: 2011-10-10 23:51:30
            29Secure communication / Electronic commerce / Learning with errors / NTRU / Transport Layer Security / Cipher suite / Elliptic curve cryptography / Quantum computer / RSA / Cryptography / Cryptographic protocols / Internet protocols

            Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos1 , Craig Costello2 , Michael Naehrig2 , and Douglas Stebila3,∗ 1 2 3

            Add to Reading List

            Source URL: csrc.nist.gov

            Language: English - Date: 2015-04-09 11:27:47
            30Hellman / Computational hardness assumptions / Finite fields / Cryptography / Public-key cryptography / Cryptographic protocols

            NIST PQC Talk A Simple Provably Secure (Authenticated) Key Exchange Scheme Based on the Learning with Errors Problem Jintai Ding

            Add to Reading List

            Source URL: csrc.nist.gov

            Language: English - Date: 2015-04-03 13:40:14
            UPDATE