scientific article; zbMATH DE number 1088230

From MaRDI portal
Publication:4364546

zbMath0889.94011MaRDI QIDQ4364546

Shai Halevi, Oded Goldreich, Shafi Goldwasser

Publication date: 25 June 1998


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (60)

SoK: how (not) to design and implement post-quantum cryptographyPost-quantum cryptography: lattice signaturesA Ring-LWE-based digital signature inspired by Lindner-Peikert scheme\textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based CryptographyA Fast Phase-based Enumeration Algorithm for SVP Challenge Through $$y$$-Sparse Representations of Short Lattice VectorsBonsai trees, or how to delegate a lattice basisPASS-encrypt: a public key cryptosystem based on partial evaluation of polynomialsThe 2010 Benjamin Franklin Medal in Computer and Cognitive Science presented to Shafrira Goldwasser, Ph.D.Efficient Nyberg-Rueppel type of NTRU digital signature algorithmSieve algorithms for some orthogonal integer latticesGaussian sampling of lattices for cryptographic applicationsOn the hardness of the finite field isomorphism problemA signature scheme from the finite field isomorphism problemThe Efficiency of Embedding-Based Attacks on the GGH Lattice-Based CryptosystemCryptanalysis of the GGH cryptosystemMultikey Fully Homomorphic Encryption and ApplicationsLattice attacks against elliptic-curve signatures with blinded scalar multiplicationLoop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signaturesLattice-based cryptography: a surveyCompact lattice gadget and its applications to hash-and-sign signaturesLattice polly cracker cryptosystemsFault analysis of the NTRUSign digital signature schemeExplicit Hard Instances of the Shortest Vector ProblemAnalysis of Error Terms of Signatures Based on Learning with ErrorsPublic key compression for constrained linear signature schemesSecure multi-source network coding scheme with lattice signatureAlgorithms for the Shortest and Closest Lattice Vector ProblemsA public-key encryption scheme based on non-linear indeterminate equationsAnalysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectorsGenerating shorter bases for hard random latticesEnhancing Goldreich, Goldwasser and Halevi's scheme with intersecting latticesLearning a Parallelepiped: Cryptanalysis of GGH and NTRU SignaturesRigorous and Efficient Short Lattice Vectors EnumerationFinding Shortest Lattice Vectors in the Presence of GapsAn experimental comparison of some LLL-type lattice basis reduction algorithmsA Digital Signature Scheme Based on CVP  ∞Learning strikes again: the case of the DRS signature schemeQuantum walk public-key cryptographic systemImprovement of Lattice-Based Cryptography Using CRTImprovements in the analysis of Kannan's CVP algorithmLattice-based identity-based resplittable threshold public key encryption schemePredicting Lattice ReductionLearning a parallelepiped: Cryptanalysis of GGH and NTRU signaturesModular lattice signatures, revisitedKey recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU latticesHardness of approximating the minimum solutions of linear Diophantine equationsA relation of primal--dual lattices and the complexity of shortest lattice vector problemOn the limits of nonapproximability of lattice problemsUnnamed ItemCryptography Based on Quadratic Forms: Complexity ConsiderationsLattice-based revocable certificateless signatureUnnamed ItemPublic-key cryptography and invariant theoryA lattice-based public-key cryptosystemA new transference theorem in the geometry of numbers and new bounds for Ajtai's connection factorThe Complexity of Public-Key CryptographyA note on BDD problems with \(\lambda_2\)-gapCryptanalysis of ITRUOn removing rejection conditions in practical lattice-based signatures




This page was built for publication: