<--- Back to Details
First PageDocument Content
Trusted computing base / Kernel / Separation kernel / Multilevel security / Operating system / Ring / Linux kernel / Unix / Security-Enhanced Linux / Computer architecture / Computer security / System software
Date: 2007-01-23 13:43:40
Trusted computing base
Kernel
Separation kernel
Multilevel security
Operating system
Ring
Linux kernel
Unix
Security-Enhanced Linux
Computer architecture
Computer security
System software

Add to Reading List

Source URL: www.csl.sri.com

Download Document from Source Website

File Size: 191,42 KB

Share Document on Facebook

Similar Documents

Algebra / Abstract algebra / Mathematics / Commutative algebra / Lattice-based cryptography / Post-quantum cryptography / Cryptography / Field theory / Ring learning with errors / Ring learning with errors key exchange / Ring learning with errors signature

On the Ring-LWE and Polynomial-LWE Problems Miruna Rosca1,2 , Damien Stehlé1 , and Alexandre Wallet1 1 ENS de Lyon, Laboratoire LIP (U. Lyon, CNRS, ENSL, INRIA, UCBL), France

DocID: 1xVxG - View Document

Wheel + Ring = Reel: the Impact of Route Filtering on the Stability of Policy Routing Luca Cittadini Giuseppe Di Battista

DocID: 1xVsm - View Document

Cryptography / Post-quantum cryptography / Lattice-based cryptography / Computational hardness assumptions / Lie groups / Ring learning with errors / Learning with errors / Lattice / Homomorphic encryption / Order / Entropy / Ring learning with errors key exchange

Order-LWE and the Hardness of Ring-LWE with Entropic Secrets Zvika Brakerski Renen Perlman Weizmann Institute of Science∗ Abstract

DocID: 1xUGh - View Document

Cryptography / Post-quantum cryptography / Lattice-based cryptography / Ring learning with errors / Learning with errors / Obfuscation / Lattice

Obfuscating Conjunctions under Entropic Ring LWE∗ Zvika Brakerski† Weizmann Vinod Vaikuntanathan‡ MIT

DocID: 1xUpK - View Document

Cryptography / Public-key cryptography / Digital signature / IP / Soundness / Group signature / Post-quantum cryptography / Designated verifier signature / Computational complexity theory

Short  Accountable  Ring   Signatures Based  on  DDH Jonathan  Bootle,  Andrea  Cerulli,  Pyrros Chaidos,  Essam Ghadafi,   Jens  Groth,  and  Christophe  Petit  

DocID: 1xU3N - View Document