Public-key cryptosystems and signature schemes from \(p\)-adic lattices
From MaRDI portal
Publication:6543365
DOI10.1134/S2070046624010035zbMATH Open1540.94061MaRDI QIDQ6543365
Lixia Luo, Zhaonan Wang, Guanju Xiao, Yanbin Pan, Yingpu Deng
Publication date: 24 May 2024
Published in: \(p\)-Adic Numbers, Ultrametric Analysis, and Applications (Search for Journal in Brave)
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Hyperelliptic cryptosystems
- Supersingular isogeny graphs and endomorphism rings: reductions and solutions
- On some computational problems in local fields
- Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Elliptic Curve Cryptosystems
- New directions in cryptography
- A method for obtaining digital signatures and public-key cryptosystems
- Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures
- Algebraic aspects of cryptography. With an appendix on hyperelliptic curves by Alfred J. Menezes, Yi-Hong Wu, and Robert J. Zuccherato
This page was built for publication: Public-key cryptosystems and signature schemes from \(p\)-adic lattices
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6543365)