Saber
From MaRDI portal
Software:36992
No author found.
Related Items (13)
A novel classical and quantum cryptographic scheme for data encryption ⋮ The matrix reloaded: multiplication strategies in FrodoKEM ⋮ Quantum algorithms for variants of average-case lattice problems via filtering ⋮ Anonymous, robust post-quantum public key encryption ⋮ Multitarget Decryption Failure Attacks and Their Application to Saber and Kyber ⋮ The direction of updatable encryption does not matter much ⋮ Recovery attack on Bob's reused randomness in CRYSTALS-KYBER and SABER ⋮ BI-NTRU Encryption Schemes: Two New Secure Variants of NTRU ⋮ Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification ⋮ Number theoretic transform: generalization, optimization, concrete analysis and applications ⋮ Rounding in the rings ⋮ Practical post-quantum password-authenticated key exchange based-on module-lattice ⋮ Implementation of lattice trapdoors on modules and applications
This page was built for software: Saber