×

Found 23 Documents (Results 1–23)

An improved BKW algorithm for LWE with applications to cryptography and lattices. (English) Zbl 1336.94058

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 43-62 (2015).
MSC:  94A60 68W30
PDFBibTeX XMLCite
Full Text: DOI arXiv

Coded-BKW: solving LWE using lattice codes. (English) Zbl 1336.94051

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 23-42 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure statistical analysis using RLWE-based homomorphic encryption. (English) Zbl 1391.94822

Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 471-487 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A comparison of the homomorphic encryption schemes FV and YASHE. (English) Zbl 1318.94071

Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2014. 7th international conference on cryptology in Africa, Marrakesh, Morocco, May 28–30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06733-9/pbk). Lecture Notes in Computer Science 8469, 318-335 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An improved compression technique for signatures based on learning with errors. (English) Zbl 1295.94011

Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 28-47 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Lattice reduction for modular knapsack. (English) Zbl 1327.94068

Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15–16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 275-286 (2013).
MSC:  94A60 11Y16 90C27
PDFBibTeX XMLCite
Full Text: DOI Link

Estimating key sizes for high dimensional lattice-based systems. (English) Zbl 1317.94139

Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17–19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 290-303 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Improved security for a ring-based fully homomorphic encryption scheme. (English) Zbl 1317.94088

Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17–19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 45-64 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Hardness of SIS and LWE with small parameters. (English) Zbl 1310.94161

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 21-39 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Solving the shortest vector problem in lattices faster using quantum search. (English) Zbl 1306.94067

Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4–7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 83-101 (2013).
MSC:  94A60 81P94 81P68
PDFBibTeX XMLCite
Full Text: DOI arXiv

The Bussard-Bagga and other distance-bounding protocols under attacks. (English) Zbl 1283.94048

Kutyłowski, Mirosław (ed.) et al., Information security and cryptology. 8th international conference, Inscrypt 2012, Beijing, China, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-38518-6/pbk). Lecture Notes in Computer Science 7763, 371-391 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Practical lattice-based cryptography: a signature scheme for embedded systems. (English) Zbl 1294.94050

Prouff, Emmanuel (ed.) et al., Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33026-1/pbk). Lecture Notes in Computer Science 7428, 530-547 (2012).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Multiparty computation from somewhat homomorphic encryption. (English) Zbl 1296.94104

Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 643-662 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Public-key cryptography from new multivariate quadratic assumptions. (English) Zbl 1287.94073

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 190-205 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Trapdoors for lattices: simpler, tighter, faster, smaller. (English) Zbl 1297.94090

Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 700-718 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Faster algorithms for approximate common divisors: breaking fully-homomorphic-encryption challenges over the integers. (English) Zbl 1297.94059

Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 502-519 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

BKZ 2.0: Better lattice security estimates. (English) Zbl 1227.94037

Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 1-20 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

Year of Publication

all top 3

Main Field

all top 3

Software