1![Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos1 , Craig Costello2 , Michael Naehrig2 , and Douglas Stebila3,∗ 1 2 3 Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos1 , Craig Costello2 , Michael Naehrig2 , and Douglas Stebila3,∗ 1 2 3](https://www.pdfsearch.io/img/cfb194439ebf9b6b0e251be7bb5700af.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2016-10-26 21:12:51
|
---|
2![Vulnerable Galois RLWE Families and Improved Attacks Hao Chen, Kristin E. Lauter, Katherine E. Stange 1. Introduction Lattice-based cryptography was introduced in the mid 1990s in two different forms, independently by Aj Vulnerable Galois RLWE Families and Improved Attacks Hao Chen, Kristin E. Lauter, Katherine E. Stange 1. Introduction Lattice-based cryptography was introduced in the mid 1990s in two different forms, independently by Aj](https://www.pdfsearch.io/img/32eee3bab2e3e7df8af82d973b2680e8.jpg) | Add to Reading ListSource URL: math.colorado.eduLanguage: English - Date: 2016-02-24 10:14:48
|
---|
3![Quantum Money from Hidden Subspaces Quantum Money from Hidden Subspaces](https://www.pdfsearch.io/img/f946a949f4520e0a102efdea049b42a0.jpg) | Add to Reading ListSource URL: theoryofcomputing.orgLanguage: English - Date: 2014-11-14 13:01:23
|
---|
4![Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Douglas Stebila Queensland University of Technology joint work with Joppe Bos (NXP), Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Douglas Stebila Queensland University of Technology joint work with Joppe Bos (NXP),](https://www.pdfsearch.io/img/3fc494d709e3b12167ccd66bde6f8b74.jpg) | Add to Reading ListSource URL: files.douglas.stebila.caLanguage: English - Date: 2015-01-08 11:24:26
|
---|
5![Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos1 , Craig Costello2 , Michael Naehrig2 , and Douglas Stebila3,∗ 1 2 3 Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos1 , Craig Costello2 , Michael Naehrig2 , and Douglas Stebila3,∗ 1 2 3](https://www.pdfsearch.io/img/e7dad1acc321dfc31004df22edf8123f.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2015-04-09 11:27:47
|
---|
6![How Practical is Public-Key Encryption Based on LPN and Ring-LPN? Ivan Damg˚ ard1 and Sunoo Park2 1 How Practical is Public-Key Encryption Based on LPN and Ring-LPN? Ivan Damg˚ ard1 and Sunoo Park2 1](https://www.pdfsearch.io/img/ceec7b7b1411d994b93386462e3dadf6.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2014-04-21 15:54:23
|
---|
7![Efficient Ring-LWE Encryption on 8-bit AVR Processors Zhe Liu1 , Hwajeong Seo2 , and Sujoy Sinha Roy3 , Johann Großsch¨adl1 , Howon Kim2 , Ingrid Verbauwhede3 1 Efficient Ring-LWE Encryption on 8-bit AVR Processors Zhe Liu1 , Hwajeong Seo2 , and Sujoy Sinha Roy3 , Johann Großsch¨adl1 , Howon Kim2 , Ingrid Verbauwhede3 1](https://www.pdfsearch.io/img/8f86c57bf47e55a12bddfc3ffc2e548f.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-05-02 00:52:44
|
---|
8![Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based San Ling, Khoa Nguyen, Huaxiong Wang Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based San Ling, Khoa Nguyen, Huaxiong Wang Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University](https://www.pdfsearch.io/img/cc7ce7f2134a8775a1a8c55c8d2dda3b.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-01-09 09:24:22
|
---|