-
1
-
-
84887467921
-
Generating hard instances of the short basis problem
-
Ajtai, M.: Generating hard instances of the short basis problem. In: ICALP, pp. 1-9 (1999).
-
(1999)
ICALP
, pp. 1-9
-
-
Ajtai, M.1
-
2
-
-
38749147177
-
Generating hard instances of lattice problems
-
Preliminary version in STOC 1996
-
Ajtai, M.: Generating hard instances of lattice problems. Quad. Mat. 13, 1-32 (2004). Preliminary version in STOC 1996.
-
(2004)
Quad. Mat.
, vol.13
, pp. 1-32
-
-
Ajtai, M.1
-
3
-
-
77954654490
-
Bonsai trees, or how to delegate a lattice basis
-
Cash, D., Hofheinz, D., Kiltz, E., Peikert, C.: Bonsai trees, or how to delegate a lattice basis. In: EUROCRYPT, pp. 523-552 (2010).
-
(2010)
EUROCRYPT
, pp. 523-552
-
-
Cash, D.1
Hofheinz, D.2
Kiltz, E.3
Peikert, C.4
-
4
-
-
0009583143
-
Collision-free hashing from lattice problems
-
Goldreich, O., Goldwasser, S., Halevi, S.: Collision-free hashing from lattice problems. Electron. Colloq. Comput. Complex. (ECCC) 3(42) (1996).
-
(1996)
Electron. Colloq. Comput. Complex. (ECCC)
, vol.3
, Issue.42
-
-
Goldreich, O.1
Goldwasser, S.2
Halevi, S.3
-
5
-
-
84958655849
-
Public-key cryptosystems from lattice reduction problems
-
Goldreich, O., Goldwasser, S., Halevi, S.: Public-key cryptosystems from lattice reduction problems. In: CRYPTO, pp. 112-131 (1997).
-
(1997)
CRYPTO
, pp. 112-131
-
-
Goldreich, O.1
Goldwasser, S.2
Halevi, S.3
-
6
-
-
77954628604
-
A simple BGN-type cryptosystem from LWE
-
Gentry, C., Halevi, S., Vaikuntanathan, V.: A simple BGN-type cryptosystem from LWE. In: EUROCRYPT, pp. 506-522 (2010).
-
(2010)
EUROCRYPT
, pp. 506-522
-
-
Gentry, C.1
Halevi, S.2
Vaikuntanathan, V.3
-
7
-
-
51849137205
-
Trapdoors for hard lattices and new cryptographic constructions
-
Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: STOC, pp. 197-206 (2008).
-
(2008)
STOC
, pp. 197-206
-
-
Gentry, C.1
Peikert, C.2
Vaikuntanathan, V.3
-
8
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
Håstad, J., Impagliazzo, R., Levin, L. A., Luby, M.: A pseudorandom generator from any one-way function. SIAM J. Comput. 28(4), 1364-1396 (1999).
-
(1999)
SIAM J. Comput.
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
9
-
-
0005018185
-
Lattice points in high-dimensional spheres
-
Mazo, J. E., Odlyzko, A. M.: Lattice points in high-dimensional spheres. Mon. Math. 110(1), 47-61 (1990).
-
(1990)
Mon. Math.
, vol.110
, Issue.1
, pp. 47-61
-
-
Mazo, J.E.1
Odlyzko, A.M.2
-
10
-
-
84958950822
-
Improving lattice based cryptosystems using the Hermite normal form
-
Micciancio, D.: Improving lattice based cryptosystems using the Hermite normal form. In: CaLC, pp. 126-145 (2001).
-
(2001)
CaLC
, pp. 126-145
-
-
Micciancio, D.1
-
11
-
-
38749097694
-
Worst-case to average-case reductions based on Gaussian measures
-
Preliminary version in FOCS 2004
-
Micciancio, D., Regev, O.: Worst-case to average-case reductions based on Gaussian measures. SIAM J. Comput. 37(1), 267-302 (2007). Preliminary version in FOCS 2004.
-
(2007)
SIAM J. Comput.
, vol.37
, Issue.1
, pp. 267-302
-
-
Micciancio, D.1
Regev, O.2
-
12
-
-
70350294927
-
Lattice-based cryptography
-
Berlin: Springer
-
Micciancio, D., Regev, O.: Lattice-based cryptography. In: Post Quantum Cryptography, pp. 147-191. Springer, Berlin (2009).
-
(2009)
Post Quantum Cryptography
, pp. 147-191
-
-
Micciancio, D.1
Regev, O.2
-
13
-
-
35248837045
-
Statistical zero-knowledge proofs with efficient provers: Lattice problems and more
-
Micciancio, D., Vadhan, S. P.: Statistical zero-knowledge proofs with efficient provers: Lattice problems and more. In: CRYPTO, pp. 282-298 (2003).
-
(2003)
CRYPTO
, pp. 282-298
-
-
Micciancio, D.1
Vadhan, S.P.2
-
14
-
-
0034782091
-
A linear space algorithm for computing the Hermite normal form
-
Micciancio, D., Warinschi, B.: A linear space algorithm for computing the Hermite normal form. In: ISSAC, pp. 231-236 (2001).
-
(2001)
ISSAC
, pp. 231-236
-
-
Micciancio, D.1
Warinschi, B.2
-
15
-
-
84957089305
-
Cryptanalysis of the Goldreich-Goldwasser-Halevi cryptosystem from Crypto '97
-
Nguyen, P. Q.: Cryptanalysis of the Goldreich-Goldwasser-Halevi cryptosystem from Crypto '97. In: CRYPTO, pp. 288-304 (1999).
-
(1999)
CRYPTO
, pp. 288-304
-
-
Nguyen, P.Q.1
-
16
-
-
64249149689
-
Learning a parallelepiped: Cryptanalysis of GGH and NTRU signatures
-
Preliminary version in Eurocrypt 2006
-
Nguyen, P. Q., Regev, O.: Learning a parallelepiped: Cryptanalysis of GGH and NTRU signatures. J. Cryptol. 22(2), 139-160 (2009). Preliminary version in Eurocrypt 2006.
-
(2009)
J. Cryptol.
, vol.22
, Issue.2
, pp. 139-160
-
-
Nguyen, P.Q.1
Regev, O.2
-
17
-
-
70350642078
-
Public-key cryptosystems from the worst-case shortest vector problem
-
Peikert, C.: Public-key cryptosystems from the worst-case shortest vector problem. In: STOC, pp. 333-342 (2009).
-
(2009)
STOC
, pp. 333-342
-
-
Peikert, C.1
-
18
-
-
51849098944
-
Noninteractive statistical zero-knowledge proofs for lattice problems
-
Peikert, C., Vaikuntanathan, V.: Noninteractive statistical zero-knowledge proofs for lattice problems. In: CRYPTO, pp. 536-553 (2008).
-
(2008)
CRYPTO
, pp. 536-553
-
-
Peikert, C.1
Vaikuntanathan, V.2
-
19
-
-
51849126892
-
A framework for efficient and composable oblivious transfer
-
Peikert, C., Vaikuntanathan, V., Waters, B.: A framework for efficient and composable oblivious transfer. In: CRYPTO, pp. 554-571 (2008).
-
(2008)
CRYPTO
, pp. 554-571
-
-
Peikert, C.1
Vaikuntanathan, V.2
Waters, B.3
-
20
-
-
70349309809
-
On lattices, learning with errors, random linear codes, and cryptography
-
Preliminary version in STOC 2005
-
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM 56(6) (2009). Preliminary version in STOC 2005.
-
(2009)
J. ACM
, vol.56
, Issue.6
-
-
Regev, O.1
-
21
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
Shor, P. W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484-1509 (1997).
-
(1997)
SIAM J. Comput.
, vol.26
, Issue.5
, pp. 1484-1509
-
-
Shor, P.W.1
|