Learning with errors

Results: 81



#Item
41Learning with errors / Machine learning / Ciphertext indistinguishability / RSA / Cyberwarfare / Applied mathematics / Security / Cryptography / Public-key cryptography / Electronic commerce

How Practical is Public-Key Encryption Based on LPN and Ring-LPN? Ivan Damg˚ ard1 and Sunoo Park2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-04-21 15:54:23
42Lattice problem / Learning with errors / Lattice / Public-key cryptography / Cipher / Symmetric-key algorithm / Semantic security / GGH encryption scheme / Ideal lattice cryptography / Cryptography / Lattice-based cryptography / Homomorphic encryption

Attribute-Based Functional Encryption on Lattices (Extended Abstract) Xavier Boyen December 31, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-31 10:07:10
43Statistics / Mathematical structures / Learning with errors / Machine learning / Error detection and correction / Public-key cryptography / Normal distribution / RSA / Hash function / Algebra / Mathematics / Cryptography

An improved compression technique for signatures based on learning with errors Shi Bai and Steven D. Galbraith Department of Mathematics, University of Auckland, New Zealand.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-01-22 16:26:55
44Electronic commerce / Learning with errors / Machine learning / XTR / Normal distribution / Diffie–Hellman key exchange / Diffie–Hellman problem / RSA / Cryptography / Cryptographic protocols / Finite fields

A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem Jintai Ding, Xiang Xie, Xiaodong Lin University of Cincinnati Chinese Academy of Sciences Rutgers University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-29 14:01:16
45Cryptography / Learning with errors / Machine learning / Polynomial / Multiplication / Modular arithmetic / RSA / Fast Fourier transform / Abstract algebra / Mathematics / Algebra

Efficient Ring-LWE Encryption on 8-bit AVR Processors Zhe Liu1 , Hwajeong Seo2 , and Sujoy Sinha Roy3 , Johann Großsch¨adl1 , Howon Kim2 , Ingrid Verbauwhede3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-02 00:52:44
46Applied mathematics / Learning with errors / Public-key cryptography / Cipher / Mathematics / Technology / Cryptography / Ciphertext indistinguishability / RSA

Full version of an extended abstract published in Proceedings of PKC 2013, Springer-Verlag, 2013. Available from the IACR Cryptology ePrint Archive as ReportVerifiable Elections That Scale for Free Melissa Cha

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-14 15:12:37
47Applied mathematics / Normal distribution / Learning with errors / Algebraic geometry / Regular language / Computational complexity theory / Ideal lattice cryptography / Cryptography / Mathematics / Theoretical computer science

Algebraic Algorithms for LWE Martin R. Albrecht1 , Carlos Cid1 , Jean-Charles Faug`ere2 , and Ludovic Perret2 1 Information Security Group Royal Holloway, University of London

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-26 10:18:21
48NTRUSign / Lattice-based cryptography / NTRU / Lattice problem / RSA / Lattice / Digital signature / Learning with errors / Ideal lattice cryptography / Cryptography / Post-quantum cryptography / Public-key cryptography

Practical Lattice-based Digital Signature Schemes NIST Workshop on Cybersecurity in a Post-Quantum World J. Howe, T. Pöppelmann, M. O’Neill, E. O’Sullivan, T. Güneysu, V. Lyubashevsky

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 13:38:18
49Diffie–Hellman key exchange / Learning with errors / XTR / Onion routing / Homomorphic encryption / Transport Layer Security / RSA / Cryptography / Cryptographic protocols / Electronic commerce

Post-Quantum Secure Onion Routing (Future Anonymity in Today’s Budget) Satrajit Ghosh† † Aniket Kate‡

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:34:21
50Ciphertext / Cryptography / Learning with errors / ID-based encryption

Functional Encryption for Inner Product Predicates from Learning with Errors Shweta Agrawal1 , David Mandell Freeman2 , and Vinod Vaikuntanathan3 1 UCLA,

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2012-01-10 00:25:27
UPDATE