-
1
-
-
0029719917
-
-
Ajtai, M.: Generating hard instances of lattice problems (extended abstract). In: Proceedings of STOC 1996, pp. 99-108. ACM, New York (1996)
-
Ajtai, M.: Generating hard instances of lattice problems (extended abstract). In: Proceedings of STOC 1996, pp. 99-108. ACM, New York (1996)
-
-
-
-
2
-
-
84887467921
-
Generating hard instances of the short basis problem
-
Wiedermann, J, Van Emde Boas, P, Nielsen, M, eds, ICALP 1999, Springer, Heidelberg
-
Ajtai, M.: Generating hard instances of the short basis problem. In: Wiedermann, J., Van Emde Boas, P., Nielsen, M. (eds.) ICALP 1999. LNCS, vol. 1644, pp. 1-9. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1644
, pp. 1-9
-
-
Ajtai, M.1
-
3
-
-
0030679849
-
-
Ajtai, M., Dwork, C.: A public-key cryptosystem with worst-case/average- case equivalence. In: Proceedings of STOC 1997, pp. 284-293. ACM, New York (1997)
-
Ajtai, M., Dwork, C.: A public-key cryptosystem with worst-case/average- case equivalence. In: Proceedings of STOC 1997, pp. 284-293. ACM, New York (1997)
-
-
-
-
4
-
-
0034826416
-
-
Ajtai, M., Kumar, R., Sivakumar, D.: A sieve algorithm for the shortest lattice vector problem. In: Proceedings of STOC 2001, pp. 601-610. ACM, New York (2001)
-
Ajtai, M., Kumar, R., Sivakumar, D.: A sieve algorithm for the shortest lattice vector problem. In: Proceedings of STOC 2001, pp. 601-610. ACM, New York (2001)
-
-
-
-
5
-
-
72449132154
-
Generating shorter bases for hard random lattices
-
STACS, Springer, Heidelberg
-
Alwen, J., Peikert, C.: Generating shorter bases for hard random lattices. In: STACS 2009. LNCS. Springer, Heidelberg (2009)
-
(2009)
LNCS
-
-
Alwen, J.1
Peikert, C.2
-
6
-
-
51249173801
-
On Lovász' lattice reduction and the nearest lattice point problem
-
Babai, L.: On Lovász' lattice reduction and the nearest lattice point problem. Combinatorica 6, 1-13 (1986)
-
(1986)
Combinatorica
, vol.6
, pp. 1-13
-
-
Babai, L.1
-
7
-
-
0039576102
-
-
p with prime p ≡ 3 mod 4. App. Alg. in Eng., Comm. and Comp. 4, 89-94 (1992)
-
p with prime p ≡ 3 mod 4. App. Alg. in Eng., Comm. and Comp. 4, 89-94 (1992)
-
-
-
-
8
-
-
84990731886
-
How to prove yourself - practical solutions to identification and signature problems
-
Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
-
Fiat, A., Shamir, A.: How to prove yourself - practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
9
-
-
51849137205
-
-
Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of STOC 2008, pp. 197-206. ACM, New York (2008)
-
Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of STOC 2008, pp. 197-206. ACM, New York (2008)
-
-
-
-
10
-
-
33645593031
-
Foundations of Cryptography
-
Cambridge University Press, Cambridge
-
Goldreich, O.: Foundations of Cryptography. Basic Applications, vol. II. Cambridge University Press, Cambridge (2001)
-
(2001)
Basic Applications
, vol.2
-
-
Goldreich, O.1
-
11
-
-
84958655849
-
Public-key cryptosystems from lattice reduction problems
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Goldreich, O., Goldwasser, S., Halevi, S.: Public-key cryptosystems from lattice reduction problems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 112-131. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 112-131
-
-
Goldreich, O.1
Goldwasser, S.2
Halevi, S.3
-
12
-
-
84947808606
-
-
Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: a ring-based public key cryptosystem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, 1423, pp. 267-288. Springer, Heidelberg (1998)
-
Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: a ring-based public key cryptosystem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 267-288. Springer, Heidelberg (1998)
-
-
-
-
13
-
-
35048816448
-
Complete classification of bilinear hard-core functions
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Holenstein, T., Maurer, U., Sjödin, J.: Complete classification of bilinear hard-core functions. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 73-91. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 73-91
-
-
Holenstein, T.1
Maurer, U.2
Sjödin, J.3
-
14
-
-
58349122573
-
Concurrently secure identification schemes based on the worst-case hardness of lattice problems
-
Pieprzyk, J, ed, ASIACRYPT 2008, Springer, Heidelberg
-
Kawachi, A., Tanaka, K., Xagawa, K.: Concurrently secure identification schemes based on the worst-case hardness of lattice problems. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 372-389. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 372-389
-
-
Kawachi, A.1
Tanaka, K.2
Xagawa, K.3
-
15
-
-
40249086645
-
-
Lyubashevsky, V.: Lattice-based identification schemes secure under active attacks. In: Cramer, R. (ed.) PKC 2008. LNCS, 4939, pp. 162-179. Springer, Heidelberg (2008)
-
Lyubashevsky, V.: Lattice-based identification schemes secure under active attacks. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 162-179. Springer, Heidelberg (2008)
-
-
-
-
17
-
-
33746342484
-
Generalized compact knapsacks are collision resistant
-
Bugliesi, M, Preneel, B, Sassone, V, Wegener, I, eds, ICALP 2006, Springer, Heidelberg
-
Lyubashevsky, V., Micciancio, D.: Generalized compact knapsacks are collision resistant. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 144-155. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 144-155
-
-
Lyubashevsky, V.1
Micciancio, D.2
-
18
-
-
40249114814
-
-
Lyubashevsky, V., Micciancio, D.: Asymptotically efficient lattice-based digital signatures. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 37-54. Springer, Heidelberg (2008)
-
Lyubashevsky, V., Micciancio, D.: Asymptotically efficient lattice-based digital signatures. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 37-54. Springer, Heidelberg (2008)
-
-
-
-
19
-
-
70350336456
-
-
Lyubashevsky, V., Micciancio, D.: On bounded distance decoding, unique shortest vectors, and the minimum distance problem. In: Halevi, S. (ed.) Crypto 2009. LNCS, 5677, pp. 450-461. Springer, Heidelberg (2009)
-
Lyubashevsky, V., Micciancio, D.: On bounded distance decoding, unique shortest vectors, and the minimum distance problem. In: Halevi, S. (ed.) Crypto 2009. LNCS, vol. 5677, pp. 450-461. Springer, Heidelberg (2009)
-
-
-
-
20
-
-
38749089099
-
Generalized compact knapsacks, cyclic lattices, and efficient one-way functions
-
Micciancio, D.: Generalized compact knapsacks, cyclic lattices, and efficient one-way functions. Computational Complexity 16(4), 365-411 (2007)
-
(2007)
Computational Complexity
, vol.16
, Issue.4
, pp. 365-411
-
-
Micciancio, D.1
-
22
-
-
38749097694
-
Worst-case to average-case reductions based on gaussian measures
-
Micciancio, D., Regev, O.: Worst-case to average-case reductions based on gaussian measures. SIAM J. Comput. 37(1), 267-302 (2007)
-
(2007)
SIAM J. Comput
, vol.37
, Issue.1
, pp. 267-302
-
-
Micciancio, D.1
Regev, O.2
-
24
-
-
35248837045
-
Statistical zero-knowledge proofs with efficient provers: Lattice problems and more
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Micciancio, D., Vadhan, S.: Statistical zero-knowledge proofs with efficient provers: Lattice problems and more. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 282-298. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 282-298
-
-
Micciancio, D.1
Vadhan, S.2
-
28
-
-
70350642078
-
-
Peikert, C.: Public-key cryptosystems from the worst-case shortest vector problem. In: Proceedings of STOC 2009, pp. 333-342. ACM, New York (2009)
-
Peikert, C.: Public-key cryptosystems from the worst-case shortest vector problem. In: Proceedings of STOC 2009, pp. 333-342. ACM, New York (2009)
-
-
-
-
29
-
-
33745559478
-
-
Peikert, C., Rosen, A.: Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 145-166. Springer, Heidelberg (2006)
-
Peikert, C., Rosen, A.: Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 145-166. Springer, Heidelberg (2006)
-
-
-
-
30
-
-
51849126892
-
A framework for efficient and composable oblivious transfer
-
Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
-
Peikert, C., Vaikuntanathan, V., Waters, B.: A framework for efficient and composable oblivious transfer. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 554-571. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 554-571
-
-
Peikert, C.1
Vaikuntanathan, V.2
Waters, B.3
-
31
-
-
51849152661
-
-
Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. In: Proceedings of STOC 2008, pp. 187-196. ACM, New York (2008)
-
Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. In: Proceedings of STOC 2008, pp. 187-196. ACM, New York (2008)
-
-
-
-
32
-
-
72449162355
-
On lattices, learning with errors, random linear codes, and cryptography
-
May 2 2009
-
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. Extended version of [33], May 2 (2009), http://www.cs.tau.ac.il/ ~odedr/
-
Extended version of [33]
-
-
Regev, O.1
-
33
-
-
33745571012
-
-
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: Proceedings of STOC 2005, pp. 84-93. ACM, New York (2005)
-
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: Proceedings of STOC 2005, pp. 84-93. ACM, New York (2005)
-
-
-
-
34
-
-
67650674979
-
-
Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009. LNCS, 5444, pp. 419-436. Springer, Heidelberg (2009)
-
Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 419-436. Springer, Heidelberg (2009)
-
-
-
-
35
-
-
0023532388
-
A hierarchy of polynomial lattice basis reduction algorithms
-
Schnorr, C.P.: A hierarchy of polynomial lattice basis reduction algorithms. Theor. Comput. Sci 53, 201-224 (1987)
-
(1987)
Theor. Comput. Sci
, vol.53
, pp. 201-224
-
-
Schnorr, C.P.1
|