×

Found 138 Documents (Results 1–100)

100
MathJax

Anonymity of NIST PQC round 3 KEMs. (English) Zbl 07577800

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13277, 551-581 (2022).
MSC:  81P94 94A60
PDF BibTeX XML Cite
Full Text: DOI

Limits of polynomial packings for \(\mathbb{Z}_{p^k}\) and \(\mathbb{F}_{p^k}\). (English) Zbl 1496.94034

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13275, 521-550 (2022).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Asymptotically quasi-optimal cryptography. (English) Zbl 1496.94039

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13275, 303-334 (2022).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Unified program generation and verification: a case study on number-theoretic transform. (English) Zbl 07570118

Hanus, Michael (ed.) et al., Functional and logic programming. 16th international symposium, FLOPS 2022, Kyoto, Japan, May 10–12, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13215, 133-151 (2022).
MSC:  68N17 68N18
PDF BibTeX XML Cite
Full Text: DOI

Multitarget decryption failure attacks and their application to Saber and Kyber. (English) Zbl 1492.94087

Hanaoka, Goichiro (ed.) et al., Public-key cryptography – PKC 2022. 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8–11, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13177, 3-33 (2022).
MSC:  94A60 81P94
PDF BibTeX XML Cite
Full Text: DOI

On the higher-bit version of approximate inhomogeneous short integer solution problem. (English) Zbl 07550494

Conti, Mauro (ed.) et al., Cryptology and network security. 20th international conference, CANS 2021, Vienna, Austria, December 13–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13099, 253-272 (2021).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

The matrix reloaded: multiplication strategies in FrodoKEM. (English) Zbl 07550485

Conti, Mauro (ed.) et al., Cryptology and network security. 20th international conference, CANS 2021, Vienna, Austria, December 13–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13099, 72-91 (2021).
PDF BibTeX XML Cite
Full Text: DOI

When HEAAN meets FV: a new somewhat homomorphic encryption with reduced memory overhead. (English) Zbl 1492.94078

Paterson, Maura B. (ed.), Cryptography and coding. 18th IMA international conference, IMACC 2021, virtual event, December 14–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13129, 265-285 (2021).
MSC:  94A60 68P25 68P10
PDF BibTeX XML Cite
Full Text: DOI Link

An extension of Kannan’s embedding for solving ring-based LWE problems. (English) Zbl 1492.94151

Paterson, Maura B. (ed.), Cryptography and coding. 18th IMA international conference, IMACC 2021, virtual event, December 14–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13129, 201-219 (2021).
MSC:  94A60 11Y16
PDF BibTeX XML Cite
Full Text: DOI

Improved attacks against key reuse in learning with errors key exchange. (English) Zbl 1491.94039

Longa, Patrick (ed.) et al., Progress in cryptology – LATINCRYPT 2021. 7th international conference on cryptology and information security in Latin America, Bogotá, Colombia, October 6–8, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12912, 168-188 (2021).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Small leaks sink a great ship: an evaluation of key reuse resilience of PQC third round finalist NTRU-HRSS. (English) Zbl 07538635

Gao, Debin (ed.) et al., Information and communications security. 23rd international conference, ICICS 2021, Chongqing, China, November 19–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12919, 283-300 (2021).
MSC:  94A60 81P94
PDF BibTeX XML Cite
Full Text: DOI

When NTT meets Karatsuba: preprocess-then-NTT technique revisited. (English) Zbl 07538633

Gao, Debin (ed.) et al., Information and communications security. 23rd international conference, ICICS 2021, Chongqing, China, November 19–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12919, 249-264 (2021).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

FFT program generation for ring LWE-based cryptography. (English) Zbl 1496.94060

Nakanishi, Toru (ed.) et al., Advances in information and computer security. 16th international workshop on security, IWSEC 2021, virtual event, September 8–10, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12835, 151-171 (2021).
MSC:  94A60 65T50
PDF BibTeX XML Cite
Full Text: DOI

A trace map attack against special ring-LWE samples. (English) Zbl 1496.94051

Nakanishi, Toru (ed.) et al., Advances in information and computer security. 16th international workshop on security, IWSEC 2021, virtual event, September 8–10, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12835, 3-22 (2021).
MSC:  94A60 11Y16
PDF BibTeX XML Cite
Full Text: DOI

Lower bounds on lattice sieving and information set decoding. (English) Zbl 1486.94117

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12826, 791-820 (2021).
PDF BibTeX XML Cite
Full Text: DOI

How to meet ternary LWE keys. (English) Zbl 1486.94131

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12826, 701-731 (2021).
MSC:  94A60 81P94 81P68
PDF BibTeX XML Cite
Full Text: DOI

Implementation of lattice trapdoors on modules and applications. (English) Zbl 1485.94056

Cheon, Jung Hee (ed.) et al., Post-quantum cryptography. 12th international workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12841, 195-214 (2021).
MSC:  94A60 94A62 81P94
PDF BibTeX XML Cite
Full Text: DOI HAL

Efficient homomorphic conversion between (ring) LWE ciphertexts. (English) Zbl 1491.94042

Sako, Kazue (ed.) et al., Applied cryptography and network security. 19th international conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12726, 460-479 (2021).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Round-optimal verifiable oblivious pseudorandom functions from ideal lattices. (English) Zbl 1479.94107

Garay, Juan A. (ed.), Public-key cryptography – PKC 2021. 24th IACR international conference on practice and theory of public key cryptography, virtual event, May 10–13, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12711, 261-289 (2021).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

On the integer polynomial learning with errors problem. (English) Zbl 1479.94155

Garay, Juan A. (ed.), Public-key cryptography – PKC 2021. 24th IACR international conference on practice and theory of public key cryptography, virtual event, May 10–13, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12710, 184-214 (2021).
MSC:  94A60 62M10
PDF BibTeX XML Cite
Full Text: DOI

On the hardness of module-LWE with binary secret. (English) Zbl 1479.94133

Paterson, Kenneth G. (ed.), Topics in cryptology – CT-RSA 2021. Cryptographers’ track at the RSA conference 2021, virtual event, May 17–20, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12704, 503-526 (2021).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI HAL

SoK: how (not) to design and implement post-quantum cryptography. (English) Zbl 1479.94189

Paterson, Kenneth G. (ed.), Topics in cryptology – CT-RSA 2021. Cryptographers’ track at the RSA conference 2021, virtual event, May 17–20, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12704, 444-477 (2021).
MSC:  94A60 94A62 81P94
PDF BibTeX XML Cite
Full Text: DOI

On the ideal shortest vector problem over random rational primes. (English) Zbl 1479.94241

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12696, 559-583 (2021).
MSC:  94A60 68Q12 68Q17
PDF BibTeX XML Cite
Full Text: DOI arXiv

Efficient password-authenticated key exchange from RLWE based on asymmetric key consensus. (English) Zbl 07602260

Liu, Zhe (ed.) et al., Information security and cryptology. 15th international conference, Inscrypt 2019, Nanjing, China, December 6–8, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12020, 31-49 (2020).
MSC:  94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI

Efficient post-quantum SNARKs for RSIS and RLWE and their applications to privacy. (English) Zbl 07601039

Ding, Jinta (ed.) et al., Post-quantum cryptography. 11th international conference, PQCrypto 2020, Paris, France, April 15–17, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12100, 247-267 (2020).
MSC:  94A60 81P94
PDF BibTeX XML Cite
Full Text: DOI

Limits on the efficiency of (Ring) LWE based non-interactive key exchange. (English) Zbl 07600981

Kiayias, Aggelos (ed.) et al., Public-key cryptography – PKC 2020. 23rd IACR international conference on practice and theory of public-key cryptography, Edinburgh, UK, May 4–7, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12110, 374-395 (2020).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Gadget-based iNTRU lattice trapdoors. (English) Zbl 1492.94110

Bhargavan, Karthikeyan (ed.) et al., Progress in cryptology – INDOCRYPT 2020. 21st international conference on cryptology in India, Bangalore, India, December 13–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12578, 601-623 (2020).
MSC:  94A60 68Q45
PDF BibTeX XML Cite
Full Text: DOI

Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes. (English) Zbl 1486.94140

Kiayias, Aggelos (ed.) et al., Public-key cryptography – PKC 2020. 23rd IACR international conference on practice and theory of public-key cryptography, Edinburgh, UK, May 4–7, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12111, 37-65 (2020).
PDF BibTeX XML Cite
Full Text: DOI

The lattice-based digital signature scheme qTESLA. (English) Zbl 07314295

Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12146, 441-460 (2020).
MSC:  68M25 94A60
PDF BibTeX XML Cite
Full Text: DOI

Trapdoor delegation and HIBE from middle-product LWE in standard model. (English) Zbl 07314280

Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12146, 130-149 (2020).
MSC:  68M25 94A60
PDF BibTeX XML Cite
Full Text: DOI arXiv

Improved multiplication triple generation over rings via RLWE-based AHE. (English) Zbl 1457.94175

Mu, Yi (ed.) et al., Cryptology and network security. 18th international conference, CANS 2019, Fuzhou, China, October 25–27, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11829, 347-359 (2019).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI Link

Practical fully homomorphic encryption for fully masked neural networks. (English) Zbl 1444.94073

Mu, Yi (ed.) et al., Cryptology and network security. 18th international conference, CANS 2019, Fuzhou, China, October 25–27, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11829, 24-36 (2019).
MSC:  94A60 68T05
PDF BibTeX XML Cite
Full Text: DOI

Bi-homomorphic lattice-based PRFs and unidirectional updatable encryption. (English) Zbl 1444.94099

Mu, Yi (ed.) et al., Cryptology and network security. 18th international conference, CANS 2019, Fuzhou, China, October 25–27, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11829, 3-23 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI arXiv

BI-NTRU encryption schemes: two new secure variants of NTRU. (English) Zbl 1457.94177

Gueye, Cheikh Thiecoumba (ed.) et al., Algebra, codes and cryptology. Proceedings of the first international conference, A2C 2019, in honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5–7, 2019. Cham: Springer. Commun. Comput. Inf. Sci. 1133, 216-235 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

GiVip: a visual profiler for distributed graph processing systems. (English) Zbl 07026993

Frati, Fabrizio (ed.) et al., Graph drawing and network visualization. 25th international symposium, GD 2017, Boston, MA, USA, September 25–27, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10692, 256-271 (2018).
MSC:  68R10 68U05
PDF BibTeX XML Cite
Full Text: DOI arXiv

LWE without modular reduction and improved side-channel attacks against BLISS. (English) Zbl 1446.94109

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 494-524 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Short, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofs. (English) Zbl 1423.94087

Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10820, 204-224 (2018).
MSC:  94A60 94B25
PDF BibTeX XML Cite
Full Text: DOI

Memory lower bounds of reductions revisited. (English) Zbl 1423.94113

Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10820, 61-90 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

HILA5: on reliability, reconciliation, and error correction for Ring LWE encryption. (English) Zbl 1384.94098

Adams, Carlisle (ed.) et al., Selected areas in cryptography – SAC 2017. 24th international conference, Ottawa, ON, Canada, August 16–18, 2017. Revised selected papers. Cham: Springer (ISBN 978-3-319-72564-2/pbk; 978-3-319-72565-9/ebook). Lecture Notes in Computer Science 10719, 192-212 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Efficient reductions in cyclotomic rings – application to Ring LWE based FHE schemes. (English) Zbl 1384.94029

Adams, Carlisle (ed.) et al., Selected areas in cryptography – SAC 2017. 24th international conference, Ottawa, ON, Canada, August 16–18, 2017. Revised selected papers. Cham: Springer (ISBN 978-3-319-72564-2/pbk; 978-3-319-72565-9/ebook). Lecture Notes in Computer Science 10719, 151-171 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Tightly secure ring-LWE based key encapsulation with short ciphertexts. (English) Zbl 07575930

Foley, Simon N. (ed.) et al., Computer security – ESORICS 2017. 22nd European symposium on research in computer security, Oslo, Norway, September 11–15, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10492, 29-46 (2017).
MSC:  94A60 68M25 68P25
PDF BibTeX XML Cite
Full Text: DOI Link

Sampling from arbitrary centered discrete Gaussians for lattice-based cryptography. (English) Zbl 07551476

Gollmann, Dieter (ed.) et al., Applied cryptography and network security. 15th international conference, ACNS 2017, Kanazawa, Japan, July 10–12, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10355, 3-19 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Post-quantum key exchange for the Internet and the open quantum safe project. (English) Zbl 1412.94213

Avanzi, Roberto (ed.) et al., Selected areas in cryptography – SAC 2016. 23rd international conference, St. John’s, NL, Canada, August 10–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10532, 14-37 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Privacy-friendly forecasting for the smart grid using homomorphic encryption and the group method of data handling. (English) Zbl 1408.94928

Joye, Marc (ed.) et al., Progress in cryptology – AFRICACRYPT 2017. 9th international conference on cryptology in Africa, Dakar, Senegal, May 24–26, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10239, 184-201 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Private conjunctive query over encrypted data. (English) Zbl 1408.94961

Joye, Marc (ed.) et al., Progress in cryptology – AFRICACRYPT 2017. 9th international conference on cryptology in Africa, Dakar, Senegal, May 24–26, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10239, 149-164 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Lattice-based SNARGs and their application to more efficient obfuscation. (English) Zbl 1415.94412

Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10212, 247-277 (2017).
MSC:  94A60 68Q17
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type

Reviewing State

all top 5

Author

all top 5

Year of Publication

all top 3

Classification

all top 3

Software