Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
FrodoKEM - MaRDI portal

FrodoKEM

From MaRDI portal
Software:46969



swMATH35260MaRDI QIDQ46969


No author found.

Source code repository: https://github.com/Microsoft/PQCrypto-LWEKE




Related Items (24)

Lower bounds on lattice sieving and information set decodingShortest vectors in lattices of Bai-Galbraith's embedding attack on the LWR problemA novel classical and quantum cryptographic scheme for data encryptionKey mismatch attack on ThreeBears, Frodo and Round5Towards post-quantum security for signal's X3DH handshakeUniversal product learning with errors: a new variant of \textsf{LWE} for lattice-based cryptographyThe matrix reloaded: multiplication strategies in FrodoKEMA note on the concrete hardness of the shortest independent vector in latticesAnonymous, robust post-quantum public key encryptionAlgebraic generalization of Diffie-Hellman key exchangeComparison analysis of Ding's RLWE-based key exchange protocol and NewHope variantsEstimation of the hardness of the learning with errors problem with a restricted number of samplesOn the asymptotic complexity of solving LWEJust Take the Average! An Embarrassingly Simple $2^n$-Time Algorithm for SVP (and CVP)Assessing the feasibility of single trace power analysis of FrodoTighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge SettingExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationDAGS: key encapsulation using dyadic GS codesUnnamed ItemA framework for cryptographic problems from linear algebraVerifying solutions to LWE with implications for concrete securityLimits on the efficiency of (ring) LWE-based non-interactive key exchangePractical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiencyStrongly leakage resilient authenticated key exchange, revisited


This page was built for software: FrodoKEM