Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
SWIFFT - MaRDI portal

SWIFFT

From MaRDI portal
Software:23528



swMATH11588MaRDI QIDQ23528


No author found.

Source code repository: https://github.com/micciancio/SWIFFT




Related Items (50)

Efficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to PrivacyAn intermediate secret-guessing attack on hash-based signaturesCryptography from Learning Parity with NoiseTrapdoors for Lattices: Simpler, Tighter, Faster, SmallerImproved Information Set Decoding for Code-Based Cryptosystems with Constrained MemoryTowards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable HardwareFull Lattice Basis Reduction on Graphics CardsPost-quantum cryptography: lattice signaturesA pseudorandom number generator based on worst-case lattice problemsWhen NTT meets Karatsuba: preprocess-then-NTT technique revisitedScalable zero knowledge via cycles of elliptic curvesMiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative ComplexityD-NTRU: more efficient and average-case IND-CPA secure NTRU variantCCA updatable encryption against malicious re-encryption attacksThe extended \(k\)-tree algorithmImproved combinatorial algorithms for the inhomogeneous short integer solution problemExplicit Hard Instances of the Shortest Vector ProblemA characterization of chameleon hash functions and new, efficient designsETRU: NTRU over the Eisenstein integersImproving BDD Cryptosystems in General LatticesA Ciphertext Policy Attribute-Based Encryption Scheme without PairingsMaking NTRU as Secure as Worst-Case Problems over Ideal LatticesParallel Shortest Lattice Vector Enumeration on Graphics CardsNew Generic Algorithms for Hard KnapsacksPractical Lattice-Based Cryptography: A Signature Scheme for Embedded SystemsOn the complexity of the BKW algorithm on LWEComputing Generator in Cyclotomic Integer RingsAmortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness SlackA Toolkit for Ring-LWE CryptographyA Lattice-Based Threshold Ring Signature SchemeImproved Zero-Knowledge Identification with LatticesInterpreting Hash Function Security ProofsCryptographic Functions from Worst-Case Complexity AssumptionsHash Functions from Sigma Protocols and Improvements to VSHConcurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice ProblemsRigorous and Efficient Short Lattice Vectors EnumerationLattice-Based Identification Schemes Secure Under Active AttacksCONSTRUCTION OF FAMILY OF HASH FUNCTIONS BASED ON IDEAL LATTICEFully Homomorphic Encryption from Ring-LWE and Security for Key Dependent MessagesAn Efficient Post-Quantum One-Time Signature SchemeThe Geometry of Lattice CryptographyUnnamed ItemHow to Prove Knowledge of Small SecretsA Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach PracticalFiat-Shamir with Aborts: Applications to Lattice and Factoring-Based SignaturesA new Gaussian sampling for trapdoor lattices with arbitrary modulusA Parallel GPU Implementation of SWIFFTXPseudorandom Functions: Three Decades LaterImproved Short Lattice Signatures in the Standard ModelScalable Zero Knowledge via Cycles of Elliptic Curves


This page was built for software: SWIFFT