Search

Your search keyword '"ring-LWE"' showing total 112 results

Search Constraints

Start Over You searched for: Descriptor "ring-LWE" Remove constraint Descriptor: "ring-LWE"
112 results on '"ring-LWE"'

Search Results

2. Quantum Security of a Compact Multi-Signature.

3. Algebraically Structured LWE, Revisited.

4. Revisiting an Extension of Kannan’s Embedding for Ring-LWE

5. On the Weakness of Ring-LWE mod Prime Ideal by Trace Map

6. XSPIR: Efficient Symmetrically Private Information Retrieval from Ring-LWE

8. Polar coding for Ring-LWE-based public key encryption.

9. On Advances of Lattice-Based Cryptographic Schemes and Their Implementations.

10. On the hardness of NTRU problems.

11. A Trace Map Attack Against Special Ring-LWE Samples

12. On the Ideal Shortest Vector Problem over Random Rational Primes

13. Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing.

14. Accelerating Lattice Based Proxy Re-encryption Schemes on GPUs

15. Tree-Based Ring-LWE Group Key Exchanges with Logarithmic Complexity

16. Improving Key Mismatch Attack on NewHope with Fewer Queries

17. LizarMong: Excellent Key Encapsulation Mechanism Based on RLWE and RLWR

18. Towards a Ring Analogue of the Leftover Hash Lemma

19. Discretisation and Product Distributions in Ring-LWE

20. (In)Security of Ring-LWE Under Partial Key Exposure

21. CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes

22. Integer Version of Ring-LWE and Its Applications

23. BI-NTRU Encryption Schemes: Two New Secure Variants of NTRU

24. Order-LWE and the Hardness of Ring-LWE with Entropic Secrets

25. Improved Multiplication Triple Generation over Rings via RLWE-Based AHE

26. The Impact of Error Dependencies on Ring/Mod-LWE/LWR Based Schemes

27. Provably Secure NTRUEncrypt over Any Cyclotomic Field

28. LWE from non-commutative group rings.

29. FPGA-Based Hardware Accelerator for Leveled Ring-LWE Fully Homomorphic Encryption

30. An efficient full dynamic group signature scheme over ring

31. Efficient KEA-Style Lattice-Based Authenticated Key Exchange

32. Subring Homomorphic Encryption

33. Two-Message Key Exchange with Strong Security from Ideal Lattices

34. HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE Encryption

35. NTRU Prime: Reducing Attack Surface at Low Cost

36. A New Secure Matrix Multiplication from Ring-LWE

37. Reconciliation based key exchange schemes using lattices: a review.

38. Identity-Based Proxy Re-encryption over NTRU Lattices for Cloud Computing.

39. High-Secure Fingerprint Authentication System Using Ring-LWE Cryptography

40. A Note on Ring-LWE Security in the Case of Fully Homomorphic Encryption

41. Towards a Ring Analogue of the Leftover Hash Lemma.

42. (In)Security of Ring-LWE Under Partial Key Exposure.

43. Discretisation and Product Distributions in Ring-LWE.

44. Adaptive Security with Quasi-Optimal Rate

45. NewHope on ARM Cortex-M

46. Speeding up R-LWE Post-quantum Key Exchange

47. Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols

48. VPQC: A Domain-Specific Vector Processor for Post-Quantum Cryptography Based on RISC-V Architecture.

49. Post-Quantum Lattice-Based Cryptography Implementations: A Survey.

50. Compact Ring-LWE Cryptoprocessor

Catalog

Books, media, physical & digital resources