Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts
暂无分享,去创建一个
[1] Zhe Liu,et al. Efficient Ring-LWE Encryption on 8-Bit AVR Processors , 2015, CHES.
[2] Vinod Vaikuntanathan,et al. Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages , 2011, CRYPTO.
[3] Mark Zhandry,et al. Random Oracles in a Quantum World , 2010, ASIACRYPT.
[4] Jintai Ding,et al. A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem , 2012, IACR Cryptol. ePrint Arch..
[5] David Cash,et al. Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems , 2009, CRYPTO.
[6] Martin R. Albrecht. On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL , 2017, EUROCRYPT.
[7] Paz Morillo,et al. Easy Verifiable Primitives and Practical Public Key Cryptosystems , 2003, ISC.
[8] Frederik Vercauteren,et al. Compact Ring-LWE Cryptoprocessor , 2014, CHES.
[9] Jung Hee Cheon,et al. A Practical Post-Quantum Public-Key Cryptosystem Based on \textsf spLWE , 2016, ICISC.
[10] Chris Peikert,et al. A Toolkit for Ring-LWE Cryptography , 2013, IACR Cryptol. ePrint Arch..
[11] Alexander May,et al. Parallel Implementation of BDD enumeration for LWE , 2016, IACR Cryptol. ePrint Arch..
[12] Frederik Vercauteren,et al. A masked ring-LWE implementation , 2015, IACR Cryptol. ePrint Arch..
[13] Chris Peikert,et al. Better Key Sizes (and Attacks) for LWE-Based Encryption , 2011, CT-RSA.
[14] Shi Bai,et al. Lattice Decoding Attacks on Binary LWE , 2014, ACISP.
[15] Chaohui Du,et al. A Family of Scalable Polynomial Multiplier Architectures for Ring-LWE Based Cryptosystems , 2016, IACR Cryptol. ePrint Arch..
[16] Dominique Unruh,et al. Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms , 2016, TCC.
[17] Tatsuaki Okamoto,et al. Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, Journal of Cryptology.
[18] Alexander W. Dent,et al. A Designer's Guide to KEMs , 2003, IMACC.
[19] Jung Hee Cheon,et al. A Practical Post-Quantum Public-Key Cryptosystem Based on spLWE , 2016, IACR Cryptol. ePrint Arch..
[20] Martin R. Albrecht,et al. On the concrete hardness of Learning with Errors , 2015, J. Math. Cryptol..
[21] Tatsuaki Okamoto,et al. How to Enhance the Security of Public-Key Encryption at Minimum Cost , 1999, Public Key Cryptography.
[22] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..
[23] Oded Regev,et al. Lattice-Based Cryptography , 2006, CRYPTO.
[24] Eike Kiltz,et al. A Modular Analysis of the Fujisaki-Okamoto Transformation , 2017, TCC.
[25] Frederik Vercauteren,et al. High-Speed Polynomial Multiplication Architecture for Ring-LWE and SHE Cryptosystems , 2015, IEEE Transactions on Circuits and Systems I: Regular Papers.
[26] Pierre-Alain Fouque,et al. An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices , 2015, IACR Cryptol. ePrint Arch..
[27] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2009, JACM.
[28] Brent Waters,et al. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based , 2013, CRYPTO.
[29] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[30] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[31] Chris Peikert,et al. Lattice Cryptography for the Internet , 2014, PQCrypto.