Learning with errors

Results: 81



#Item
1Cryptography / Post-quantum cryptography / Lattice-based cryptography / Computational hardness assumptions / Ring learning with errors / Learning with errors / Digital signature / Hash function / Multivariate random variable / Normal distribution / RSA / Entropy

An improved compression technique for signatures based on learning with errors Shi Bai and Steven D. Galbraith Department of Mathematics, University of Auckland, New Zealand.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-01-22 16:26:55
2Cryptography / Post-quantum cryptography / Public-key cryptography / Supersingular isogeny key exchange / Sidh / Elliptic curve cryptography / DiffieHellman key exchange / Isogeny / Elliptic curve / Supersingular variety / Whitfield Diffie / Isogenous

Practical post-quantum key exchange from the Learning with Errors Problem

Add to Reading List

Source URL: rwc.iacr.org

Language: English - Date: 2018-01-13 06:28:10
3

Quantum computers and factoring Learning with errors Cryptography from LWE From linear algebra to post-quantum cryptography

Add to Reading List

Source URL: pqcrypto.eu.org

Language: English - Date: 2016-11-21 18:19:16
    4

    FrodoKEM Learning With Errors Key Encapsulation Algorithm Specifications And Supporting Documentation November 30,

    Add to Reading List

    Source URL: frodokem.org

    - Date: 2017-12-17 17:28:41
      5

      Interpolating Predicate and Functional Encryption from Learning With Errors Shweta Agrawal ∗

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2016-09-22 05:13:43
        6

        Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos1 , Craig Costello2 , Michael Naehrig2 , and Douglas Stebila3,∗ 1 2 3

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2016-10-26 21:12:51
          7

          On Ideal Lattices and Learning with Errors Over Rings∗ Vadim Lyubashevsky† Chris Peikert‡

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2013-06-25 20:43:36
            8Cryptography / Post-quantum cryptography / Learning with errors / Machine learning / Lattice / Ideal lattice cryptography

            Parallel Implementation of BDD enumeration for LWE Elena Kirshanova, Alexander May, Friedrich Wiemer Horst G¨ ortz Institute for IT-Security Faculty of Mathematics

            Add to Reading List

            Source URL: www.cits.rub.de

            Language: English - Date: 2016-06-24 05:04:33
            9Cryptography / Post-quantum cryptography / Learning with errors / Lattice-based cryptography / Quantum computing / Normal distribution / Probability distribution / XTR / Lattice / Public-key cryptography / Transport Layer Security / Ideal lattice cryptography

            Post-quantum key exchange – a new hope Erdem Alkim1 , Léo Ducas2 , Thomas Pöppelmann3 , and Peter Schwabe4 ? 1

            Add to Reading List

            Source URL: cryptojedi.org

            Language: English - Date: 2015-12-08 11:13:38
            10Homeomorphisms / Homomorphic encryption / Public-key cryptography / Learning with errors / Spectral theory

            FHE Circuit Privacy Almost For Free Florian Bourse∗ , Rafa¨el Del Pino† , Michele Minelli‡ , and Hoeteck Wee§ ENS, CNRS, INRIA, and PSL Research University, Paris, France {fbourse,delpino,minelli,wee}@di.ens.fr

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2016-06-13 09:13:32
            UPDATE