Leakage of signal function with reused keys in RLWE key exchange
暂无分享,去创建一个
Jintai Ding | Scott R. Fluhrer | Xiaodong Lin | Saed Alsayigh | R. V. Saraswathy | Jintai Ding | Xiaodong Lin | R. Saraswathy | Saed Alsayigh | S. Fluhrer
[1] Jintai Ding,et al. A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem , 2012, IACR Cryptol. ePrint Arch..
[2] David Cash,et al. Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems , 2009, CRYPTO.
[3] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[4] Erdem Alkim,et al. Post-quantum Key Exchange - A New Hope , 2016, USENIX Security Symposium.
[5] Atsushi Fujioka,et al. Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices , 2012, Public Key Cryptography.
[6] Craig Gentry,et al. Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..
[7] Jintai Ding,et al. Authenticated Key Exchange from Ideal Lattices , 2015, EUROCRYPT.
[8] Scott R. Fluhrer,et al. Cryptanalysis of ring-LWE based key exchange with key share reuse , 2016, IACR Cryptol. ePrint Arch..
[9] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[10] Daniele Micciancio,et al. Worst-case to average-case reductions based on Gaussian measures , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[11] Yunlei Zhao,et al. Small Field Attack, and Revisiting RLWE-Based Authenticated Key Exchange from Eurocrypt'15 , 2016, IACR Cryptol. ePrint Arch..
[12] Vinod Vaikuntanathan,et al. Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages , 2011, CRYPTO.
[13] Ronald Fagin,et al. Proceedings of the thirty-seventh annual ACM symposium on Theory of computing , 2005, STOC 2005.
[14] Daniele Micciancio,et al. Worst-case to average-case reductions based on Gaussian measures , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[15] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2009, JACM.
[16] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[17] Chris Peikert,et al. Lattice Cryptography for the Internet , 2014, PQCrypto.
[18] Chris Peikert,et al. Public-key cryptosystems from the worst-case shortest vector problem: extended abstract , 2009, STOC '09.
[19] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[20] Craig Costello,et al. Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem , 2015, 2015 IEEE Symposium on Security and Privacy.