<--- Back to Details
First PageDocument Content
Cryptography / Post-quantum cryptography / Ciphertext indistinguishability / Ring learning with errors / Chosen-plaintext attack / Learning with errors / Advantage / Lattice-based cryptography / Chosen-ciphertext attack / Digital signature / Ideal lattice cryptography / Semantic security
Date: 2018-07-25 08:38:21
Cryptography
Post-quantum cryptography
Ciphertext indistinguishability
Ring learning with errors
Chosen-plaintext attack
Learning with errors
Advantage
Lattice-based cryptography
Chosen-ciphertext attack
Digital signature
Ideal lattice cryptography
Semantic security

CRYSTALS – Kyber: a CCA-secure module-lattice-based KEM Joppe Bos∗ , Léo Ducas† , Eike Kiltz‡ , Tancrède Lepoint§ , Vadim Lyubashevsky¶ , John M. Schanckk , Peter Schwabe∗∗ , Gregor Seiler†† , Damien

Add to Reading List

Source URL: cryptojedi.org

Download Document from Source Website

File Size: 450,18 KB

Share Document on Facebook

Similar Documents

Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

DocID: 1rlwp - View Document

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

DocID: 1qWnQ - View Document

Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang1,2 Reza Reyhanitabar3

Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang1,2 Reza Reyhanitabar3

DocID: 1qBQm - View Document

A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA

A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA

DocID: 1pT7s - View Document

Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1

Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1

DocID: 1pPLX - View Document