Search

Your search keyword '"Learning with errors"' showing total 844 results

Search Constraints

Start Over You searched for: Descriptor "Learning with errors" Remove constraint Descriptor: "Learning with errors"
844 results on '"Learning with errors"'

Search Results

1. Further improvements of the estimation of key enumeration with applications to solving LWE.

2. Memory-Sample Lower Bounds for LWE

3. The Cool and the Cruel: Separating Hard Parts of LWE Secrets

5. Provable Dual Attacks on Learning with Errors

6. Decentralized Private Stream Aggregation from Lattices

7. Bit Security Analysis of Lattice-Based KEMs Under Plaintext-Checking Attacks

9. Memory-Efficient Attacks on Small LWE Keys.

10. Learning with Errors: A Lattice-Based Keystone of Post-Quantum Cryptography

11. Computationally Secure Semi‐Quantum All‐Or‐Nothing Oblivious Transfer from Dihedral Coset States.

12. Two meaningful secret image sharing schemes based on integer wavelet transform and LWE.

15. mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography

16. Post‐quantum secure two‐party computing protocols against malicious adversaries.

17. mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography.

18. Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services.

19. 基于理想格的两方隐私集合交集协议.

20. Secure and efficient multi-key FHE scheme supporting multi-bit messages from LWE preserving non-interactive decryption.

21. CLASSICAL HOMOMORPHIC ENCRYPTION FOR QUANTUM CIRCUITS.

23. A (t,n)- Secret image sharing with steganography based on Rook polynomial and LWE problem.

24. Modified Multi-Key Fully Homomorphic Encryption Scheme in the Plain Model.

25. Lattice-based autonomous path proxy re-encryption in the standard model.

26. Memory-Efficient Attacks on Small LWE Keys

27. An Improved BKW Algorithm for Solving LWE with Small Secrets

28. NTWE: A Natural Combination of NTRU and LWE

30. Does the Dual-Sieve Attack on Learning with Errors Even Work?

31. Quantum Search-to-Decision Reduction for the LWE Problem

32. Concrete Security from Worst-Case to Average-Case Lattice Reductions

33. Multi-key Homomorphic Secret Sharing from LWE Without Multi-key HE

35. Compact Public-Key Encryption Using Learning with Rounding

36. A construction of post quantum secure authenticated key agreement design for mobile digital rights management system.

37. 基于理想格的公钥加密方案快速实现技术研究.

38. Star-Specific Key-Homomorphic PRFs From Learning With Linear Regression

39. Leveled Fully Homomorphic Signcryption From Lattices

40. Variants of LWE : reductions, attacks and a construction

41. Non-interactive verifiable LWE-based multi secret sharing scheme.

42. Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme.

43. Maliciously circuit-private multi-key FHE and MPC based on LWE.

44. Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key Exchange

45. Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More

46. Tight Analysis of Decryption Failure Probability of Kyber in Reality

47. Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors

48. Secure Multi-party Computing Protocol Based on Efficient Fully Homomorphic Encryption

49. Hybrid dual attack on LWE with arbitrary secrets

50. The polynomial learning with errors problem and the smearing condition

Catalog

Books, media, physical & digital resources