How (Not) to Instantiate Ring-LWE
暂无分享,去创建一个
[1] Chris Peikert,et al. $\Lambda \circ \lambda$: A Functional Library for Lattice Cryptography , 2015, IACR Cryptol. ePrint Arch..
[2] Chris Peikert,et al. Public-key cryptosystems from the worst-case shortest vector problem: extended abstract , 2009, STOC '09.
[3] Chris Peikert,et al. Practical Bootstrapping in Quasilinear Time , 2013, CRYPTO.
[4] Hao Chen,et al. Vulnerable Galois RLWE Families and Improved Attacks , 2016, IACR Cryptol. ePrint Arch..
[5] Oded Regev,et al. Lattice-Based Cryptography , 2006, CRYPTO.
[6] Kousha Etessami,et al. Recursive Markov chains, stochastic grammars, and monotone systems of nonlinear equations , 2005, JACM.
[7] Chris Peikert,et al. A Toolkit for Ring-LWE Cryptography , 2013, IACR Cryptol. ePrint Arch..
[8] Ravi Kumar,et al. A sieve algorithm for the shortest lattice vector problem , 2001, STOC '01.
[9] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2009, JACM.
[10] Craig Costello,et al. Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem , 2015, 2015 IEEE Symposium on Security and Privacy.
[11] Chris Peikert,et al. Better Key Sizes (and Attacks) for LWE-Based Encryption , 2011, CT-RSA.
[12] Daniele Micciancio,et al. A Deterministic Single Exponential Time Algorithm for Most Lattice Problems Based on Voronoi Cell Computations , 2013, SIAM J. Comput..
[13] Wouter Castryck,et al. Provably Weak Instances of Ring-LWE Revisited , 2016, EUROCRYPT.
[14] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[15] Chris Peikert,et al. Lattice Cryptography for the Internet , 2014, PQCrypto.
[16] Daniele Micciancio,et al. Worst-case to average-case reductions based on Gaussian measures , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[17] Daniele Micciancio,et al. Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions , 2011, CRYPTO.
[18] Sanjeev Arora,et al. New Algorithms for Learning in Presence of Errors , 2011, ICALP.
[19] Hao Chen,et al. Attacks on Search RLWE , 2015, IACR Cryptol. ePrint Arch..
[20] Kristin E. Lauter,et al. Weak Instances of PLWE , 2014, Selected Areas in Cryptography.
[21] Daniel Dadush,et al. Solving the Shortest Vector Problem in 2n Time Using Discrete Gaussian Sampling: Extended Abstract , 2014, STOC.
[22] Kristin E. Lauter,et al. Provably Weak Instances of Ring-LWE , 2015, CRYPTO.
[23] Erdem Alkim,et al. Post-quantum Key Exchange - A New Hope , 2016, USENIX Security Symposium.
[24] Chris Peikert,et al. Λ ◦ λ : A Functional Library for Lattice Cryptography , 2015 .
[25] David Cash,et al. Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems , 2009, CRYPTO.
[26] Damien Stehlé,et al. Classical hardness of learning with errors , 2013, STOC '13.
[27] Chris Peikert,et al. Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller , 2012, IACR Cryptol. ePrint Arch..