Regev

Results: 30



#Item
11

Near-Optimal and Explicit Bell Inequality Violations Harry Buhrman∗ Oded Regev† Giannicola Scarpa‡

Add to Reading List

Source URL: qip2011.quantumlah.org

Language: English - Date: 2011-01-11 05:19:49
    12

    The Euclidean Distortion of Flat Tori Ishay Haviv∗ Oded Regev† June 20, 2010

    Add to Reading List

    Source URL: www2.mta.ac.il

    Language: English - Date: 2012-06-13 02:09:41
      13

      The List-Decoding Size of Fourier-Sparse Boolean Functions∗ Ishay Haviv† Oded Regev‡

      Add to Reading List

      Source URL: www2.mta.ac.il

      Language: English - Date: 2015-12-04 09:46:53
        14

        Tel Aviv University, Fall 2004 Lecture 2 Lecturer: Oded Regev Lattices in Computer Science LLL Algorithm Scribe: Eyal Kaplan

        Add to Reading List

        Source URL: www.cims.nyu.edu

        Language: English - Date: 2013-02-05 12:29:34
          15

          A Toolkit for Ring-LWE Cryptography Vadim Lyubashevsky∗ Chris Peikert† Oded Regev‡

          Add to Reading List

          Source URL: web.eecs.umich.edu

          Language: English - Date: 2015-09-08 16:32:03
            16

            Lattice Based Cryptography for Beginners – A supplementary note to the following 1. Peikert’s Bonn Lecture Slides 2. Lyubashevsky, Peikert and Regev: A toolkit for Ring-LWE 3. Steinfeld’s Lecture Slides on multilin

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2015-12-20 21:43:09
              17Cryptography / Lattice points / Post-quantum cryptography / Computational number theory / Linear algebra / Lattice-based cryptography / Lattice problem / Lattice / SWIFFT / Mathematics / Algebra / Abstract algebra

              Lattice-based Cryptography Daniele Micciancio∗ Oded Regev† July 22, 2008

              Add to Reading List

              Source URL: www.cims.nyu.edu

              Language: English - Date: 2008-07-22 12:40:02
              18Mathematics / Learning with errors / Lattice-based cryptography / Lattice problem / Lattice / Ideal lattice cryptography / Quantum algorithm / Quantum computer / One-way function / Cryptography / Applied mathematics / Theoretical computer science

              The Learning with Errors Problem Oded Regev∗ Abstract In this survey we describe the Learning with Errors (LWE) problem, discuss its properties, its hardness, and its cryptographic applications.

              Add to Reading List

              Source URL: www.cims.nyu.edu

              Language: English - Date: 2010-06-01 03:43:39
              19Computational complexity theory / Quantum complexity theory / Quantum cryptography / Communication / Randomized algorithm / Communication complexity / IP / PP / NP / Theoretical computer science / Applied mathematics / Quantum information science

              Simultaneous Communication Protocols with Quantum and Classical Messages Dmitry Gavinsky∗ Oded Regev†

              Add to Reading List

              Source URL: cjtcs.cs.uchicago.edu

              Language: English - Date: 2008-12-29 16:31:47
              20Tomer / Georgia / Genealogy / David Adelman / Regev / Vlad

              ac k n ow l e d g m e n t s I’d like to thank the people who have worked for me over the years, without whose effort I would have produced very little research: Andy Bernard, David Brown, Andrew Chen, David Cohen, Mi

              Add to Reading List

              Source URL: cupola.columbia.edu

              Language: English - Date: 2015-04-18 14:28:40
              UPDATE