<--- Back to Details
First PageDocument Content
Cryptography / Applied mathematics / Data Encryption Standard / Differential cryptanalysis / Cryptanalysis / Block cipher / Jean-Charles Faugre / Advanced Encryption Standard / International Cryptology Conference / Linear cryptanalysis / Lattice-based cryptography / Index of cryptography articles
Date: 2009-07-28 12:02:47
Cryptography
Applied mathematics
Data Encryption Standard
Differential cryptanalysis
Cryptanalysis
Block cipher
Jean-Charles Faugre
Advanced Encryption Standard
International Cryptology Conference
Linear cryptanalysis
Lattice-based cryptography
Index of cryptography articles

¨ Bases) Interactions between Computer Algebra (Grobner and Cryptology `

Add to Reading List

Source URL: issac2009.kias.re.kr

Download Document from Source Website

File Size: 1,08 MB

Share Document on Facebook

Similar Documents

Mathematical analysis / Mathematics / Post-quantum cryptography / Number theory / Measure theory / Cryptography / Algebra / Distribution / Support / Learning with errors / Weight / KullbackLeibler divergence

Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Shi Bai1 , Tancrède Lepoint3 , Adeline Roux-Langlois4 , Amin Sakzad5 , Damien Stehlé2 , and Ron S

DocID: 1xTbf - View Document

Some Recent Uses of Stern-like Protocols in Lattice-Based Cryptography Khoa Nguyen, Nanyang Technological University Quantum-Safe Crypto Workshop, CQT, NUS October, 3rd, 2016

DocID: 1tO6O - View Document

Lattice-Based Cryptography in Java Advisor(s): Christian Hanser and Sebastian Ramacher Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

DocID: 1s7AV - View Document

Cryptography / Applied mathematics / Data Encryption Standard / Differential cryptanalysis / Cryptanalysis / Block cipher / Jean-Charles Faugre / Advanced Encryption Standard / International Cryptology Conference / Linear cryptanalysis / Lattice-based cryptography / Index of cryptography articles

¨ Bases) Interactions between Computer Algebra (Grobner and Cryptology `

DocID: 1qRIx - View Document

Cryptography / Post-quantum cryptography / Lattice-based cryptography / Public-key cryptography / Key management / Homomorphic encryption / NTRU / Lattice problem / SWIFFT / Cryptographic hash function / Key / Lattice

Lattice Cryptography: A White Paper Daniele Micciancio∗ March 16, 2010 1

DocID: 1pUoS - View Document