Lattice Cryptography for the Internet
From MaRDI portal
Publication:2938684
DOI10.1007/978-3-319-11659-4_12zbMath1383.94037OpenAlexW151792660WikidataQ21820637 ScholiaQ21820637MaRDI QIDQ2938684
Publication date: 14 January 2015
Published in: Post-Quantum Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-11659-4_12
Related Items
Computational quantum key distribution (CQKD) on decentralized ledger and blockchain ⋮ SoK: how (not) to design and implement post-quantum cryptography ⋮ Efficient Password-Authenticated Key Exchange from RLWE Based on Asymmetric Key Consensus ⋮ Limits on the Efficiency of (Ring) LWE Based Non-interactive Key Exchange ⋮ PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model ⋮ Towards post-quantum security for signal's X3DH handshake ⋮ Improved attacks against key reuse in learning with errors key exchange ⋮ Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message ⋮ Tightly secure ring-LWE based key encapsulation with short ciphertexts ⋮ The polynomial learning with errors problem and the smearing condition ⋮ Algebraic generalization of Diffie-Hellman key exchange ⋮ Comparison analysis of Ding's RLWE-based key exchange protocol and NewHope variants ⋮ Augmented Learning with Errors: The Untapped Potential of the Error Term ⋮ A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs ⋮ Modular Design of Role-Symmetric Authenticated Key Exchange Protocols ⋮ Multiparty noninteractive key exchange from ring key-homomorphic weak PRFs ⋮ SETLA: Signature and Encryption from Lattices ⋮ On the Security of Supersingular Isogeny Cryptosystems ⋮ Post-quantum signal key agreement from SIDH ⋮ Forward-secure revocable secret handshakes from lattices ⋮ Post-quantum key exchange for the Internet and the open quantum safe project ⋮ Secure Implementation of Lattice-Based Encryption Schemes ⋮ A full RNS variant of FV like somewhat homomorphic encryption schemes ⋮ Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption ⋮ Two-pass authenticated key exchange with explicit authentication and tight security ⋮ Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World ⋮ A Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$ ⋮ Post-quantum static-static key agreement using multiple protocol instances ⋮ HILA5: on reliability, reconciliation, and error correction for Ring LWE encryption ⋮ A simple provably secure AKE from the LWE problem ⋮ Efficient Compression of SIDH Public Keys ⋮ Enhancing Goldreich, Goldwasser and Halevi's scheme with intersecting lattices ⋮ Post-Quantum Forward-Secure Onion Routing ⋮ Limits on the efficiency of (ring) LWE-based non-interactive key exchange ⋮ Modular lattice signatures, revisited ⋮ The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs ⋮ How (Not) to Instantiate Ring-LWE ⋮ Practical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiency ⋮ Strongly leakage resilient authenticated key exchange, revisited ⋮ A new post-quantum multivariate polynomial public key encapsulation algorithm ⋮ Practical post-quantum password-authenticated key exchange based-on module-lattice ⋮ Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles ⋮ On removing rejection conditions in practical lattice-based signatures