Improvement and Efficient Implementation of a Lattice-Based Signature Scheme
暂无分享,去创建一个
[1] Fuzhen Zhang. The Schur complement and its applications , 2005 .
[2] Chris Peikert,et al. Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller , 2012, IACR Cryptol. ePrint Arch..
[3] Oded Goldreich,et al. Public-Key Cryptosystems from Lattice Reduction Problems , 1996, CRYPTO.
[4] Michael Schneider,et al. Estimating the Security of Lattice-based Cryptosystems , 2010, IACR Cryptol. ePrint Arch..
[5] W. Banaszczyk. New bounds in some transference theorems in the geometry of numbers , 1993 .
[6] Peter Schwabe,et al. Software Speed Records for Lattice-Based Signatures , 2013, PQCrypto.
[7] David Cash,et al. Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems , 2009, CRYPTO.
[8] Damien Stehlé,et al. Classical hardness of learning with errors , 2013, STOC '13.
[9] Chris Peikert,et al. An Efficient and Parallel Gaussian Sampler for Lattices , 2010, CRYPTO.
[10] George Marsaglia,et al. A Fast, Easily Implemented Method for Sampling from Decreasing or Symmetric Unimodal Density Functions , 1984 .
[11] Léo Ducas,et al. Ring-LWE in Polynomial Rings , 2012, IACR Cryptol. ePrint Arch..
[12] 今井 浩. 20世紀の名著名論:Peter Shor : Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 2004 .
[13] Daniele Micciancio. Generalized Compact Knapsacks, Cyclic Lattices, and Efficient One-Way Functions , 2007, computational complexity.
[14] William Whyte,et al. NTRUSIGN: Digital Signatures Using the NTRU Lattice , 2003, CT-RSA.
[15] Daniele Micciancio,et al. Asymptotically Effi cient Lattice-Based Digital Signatures , 2008, IACR Cryptol. ePrint Arch..
[16] Vadim Lyubashevsky,et al. Towards practical lattice-based cryptography , 2008 .
[17] Ron Steinfeld,et al. Efficient Public Key Encryption Based on Ideal Lattices , 2009, ASIACRYPT.
[18] Chris Peikert,et al. A Toolkit for Ring-LWE Cryptography , 2013, IACR Cryptol. ePrint Arch..
[19] Léo Ducas,et al. Lattice Signatures and Bimodal Gaussians , 2013, IACR Cryptol. ePrint Arch..
[20] Miklós Ajtai,et al. Generating Hard Instances of the Short Basis Problem , 1999, ICALP.
[21] Craig Gentry,et al. Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..
[22] Ron Larson. Calculus: An Applied Approach , 1988 .
[23] Jacques Stern,et al. A New Identification Scheme Based on Syndrome Decoding , 1993, CRYPTO.
[24] Johannes A. Buchmann,et al. Merkle Signatures with Virtually Unlimited Signature Capacity , 2007, ACNS.
[25] Ron Larson,et al. Brief Calculus: An Applied Approach , 1999 .
[26] Joseph H. Silverman,et al. NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.
[27] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[28] Peter W. Shor. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1999 .
[29] Miklós Ajtai,et al. Generating hard instances of lattice problems (extended abstract) , 1996, STOC '96.
[30] Pascal Véron,et al. Improved identification schemes based on error-correcting codes , 2009, Applicable Algebra in Engineering, Communication and Computing.
[31] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[32] Chris Peikert,et al. Generating Shorter Bases for Hard Random Lattices , 2009, Theory of Computing Systems.
[33] Damien Stehlé,et al. Hardness of decision (R)LWE for any modulus , 2012, IACR Cryptol. ePrint Arch..
[34] Sidi Mohamed El Yousfi Alaoui,et al. Extended Security Arguments for Signature Schemes , 2012, AFRICACRYPT.
[35] Daniele Micciancio,et al. Worst-case to average-case reductions based on Gaussian measures , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[36] Tim Güneysu,et al. Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems , 2012, CHES.
[37] Abhishek Banerjee,et al. Pseudorandom Functions and Lattices , 2012, EUROCRYPT.
[38] Vadim Lyubashevsky. Search to decision reduction for the learning with errors over rings problem , 2011, 2011 IEEE Information Theory Workshop.
[39] Johannes A. Buchmann,et al. Instantiating Treeless Signature Schemes , 2013, IACR Cryptol. ePrint Arch..
[40] Daniele Micciancio. Lattice-Based Cryptography , 2011, Encyclopedia of Cryptography and Security.
[41] Vadim Lyubashevsky,et al. Lattice Signatures Without Trapdoors , 2012, IACR Cryptol. ePrint Arch..
[42] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[43] Oded Regev,et al. Lattice-Based Cryptography , 2006, CRYPTO.
[44] Vadim Lyubashevsky,et al. Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures , 2009, ASIACRYPT.