-
1
-
-
77954625601
-
Efficient lattice (H)IBE in the standard model
-
Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
-
Agrawal, S., Boneh, D., Boyen, X.: Efficient lattice (H)IBE in the standard model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 553-572. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 553-572
-
-
Agrawal, S.1
Boneh, D.2
Boyen, X.3
-
2
-
-
38749147177
-
Generating hard instances of lattice problems
-
Preliminary version in STOC 1996
-
Ajtai, M.: Generating hard instances of lattice problems. Quaderni di Matemat-ica 13, 1-32 (2004); Preliminary version in STOC 1996
-
(2004)
Quaderni di Matemat-ica
, vol.13
, pp. 1-32
-
-
Ajtai, M.1
-
3
-
-
0030679849
-
A public-key cryptosystem with worst-case/average-case equivalence
-
Ajtai, M., Dwork, C.: A public-key cryptosystem with worst-case/average- case equivalence. In: STOC, pp. 284-293 (1997)
-
(1997)
STOC
, pp. 284-293
-
-
Ajtai, M.1
Dwork, C.2
-
4
-
-
77949306191
-
The first and fourth public-key cryptosystems with worst-case/average- case equivalence
-
Ajtai, M., Dwork, C.: The first and fourth public-key cryptosystems with worst-case/average-case equivalence. Electronic Colloquium on Computational Complexity (ECCC) 14(97) (2007)
-
(2007)
Electronic Colloquium on Computational Complexity (ECCC)
, vol.14
, Issue.97
-
-
Ajtai, M.1
Dwork, C.2
-
5
-
-
0034826416
-
A sieve algorithm for the shortest lattice vector problem
-
Ajtai, M., Kumar, R., Sivakumar, D.: A sieve algorithm for the shortest lattice vector problem. In: STOC, pp. 601-610 (2001) (Pubitemid 32865777)
-
(2001)
Conference Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 601-610
-
-
Ajtai, M.1
Kumar, R.2
Sivakumar, D.3
-
6
-
-
0344118879
-
More on average case vs approximation complexity
-
Alekhnovich, M.: More on average case vs approximation complexity. In: FOCS, pp. 298-307 (2003)
-
(2003)
FOCS
, pp. 298-307
-
-
Alekhnovich, M.1
-
7
-
-
70350342511
-
Fast cryptographic primitives and circular-secure encryption based on hard learning problems
-
Halevi, S. (ed.) CRYPTO 2009 Springer, Heidelberg
-
Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast cryptographic primitives and circular-secure encryption based on hard learning problems. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 595-618. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 595-618
-
-
Applebaum, B.1
Cash, D.2
Peikert, C.3
Sahai, A.4
-
8
-
-
51249173801
-
On Lov́asz' lattice reduction and the nearest lattice point problem
-
Preliminary version in STACS 1985
-
Babai, L.: On Lov́asz' lattice reduction and the nearest lattice point problem. Combinatorica 6(1), 1-13 (1986); Preliminary version in STACS 1985
-
(1986)
Combinatorica
, vol.6
, Issue.1
, pp. 1-13
-
-
Babai, L.1
-
9
-
-
0000303291
-
New bounds in some transference theorems in the geometry of numbers
-
Banaszczyk, W.: New bounds in some transference theorems in the geometry of numbers. Mathematische Annalen 296(4), 625-635 (1993)
-
(1993)
Mathematische Annalen
, vol.296
, Issue.4
, pp. 625-635
-
-
Banaszczyk, W.1
-
11
-
-
67650685947
-
Possibility and impossibility results for encryption and commitment secure under selective opening
-
Joux, A. (ed.) EUROCRYPT 2009 Springer, Heidelberg
-
Bellare, M., Hofheinz, D., Yilek, S.: Possibility and impossibility results for encryption and commitment secure under selective opening. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 1-35. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 1-35
-
-
Bellare, M.1
Hofheinz, D.2
Yilek, S.3
-
12
-
-
24144453496
-
Noise-tolerant learning, the parity problem, and the statistical query model
-
DOI 10.1145/792538.792543
-
Blum, A., Kalai, A., Wasserman, H.: Noise-tolerant learning, the parity problem, and the statistical query model. J. ACM 50(4), 506-519 (2003) (Pubitemid 43906335)
-
(2003)
Journal of the ACM
, vol.50
, Issue.4
, pp. 506-519
-
-
Blum, A.1
Kalai, A.2
Wasserman, H.3
-
13
-
-
77954654490
-
Bonsai trees, or how to delegate a lattice basis
-
Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
-
Cash, D., Hofheinz, D., Kiltz, E., Peikert, C.: Bonsai trees, or how to delegate a lattice basis. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 523-552. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 523-552
-
-
Cash, D.1
Hofheinz, D.2
Kiltz, E.3
Peikert, C.4
-
14
-
-
44449128937
-
Predicting lattice reduction
-
DOI 10.1007/978-3-540-78967-3-3, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Gama, N., Nguyen, P.Q.: Predicting lattice reduction. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 31-51. Springer, Heidelberg (2008) (Pubitemid 351762822)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965
, pp. 31-51
-
-
Gama, N.1
Nguyen, P.Q.2
-
15
-
-
77954651254
-
Lattice enumeration using extreme pruning
-
Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
-
Gama, N., Nguyen, P.Q., Regev, O.: Lattice enumeration using extreme pruning. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 257-278. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 257-278
-
-
Gama, N.1
Nguyen, P.Q.2
Regev, O.3
-
16
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC, pp. 169-178 (2009)
-
(2009)
STOC
, pp. 169-178
-
-
Gentry, C.1
-
17
-
-
51849137205
-
Trapdoors for hard lattices and new cryptographic constructions
-
Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: STOC, pp. 197-206 (2008)
-
(2008)
STOC
, pp. 197-206
-
-
Gentry, C.1
Peikert, C.2
Vaikuntanathan, V.3
-
18
-
-
84947808606
-
NTRU: A ring-based public key cryptosystem
-
Algorithmic Number Theory
-
Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: A ring-based public key cryp-tosystem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 267-288. Springer, Heidelberg (1998) (Pubitemid 128093558)
-
(1998)
Lecture Notes in Computer Science
, Issue.1423
, pp. 267-288
-
-
Hoffstein, J.1
Pipher, J.2
Silverman, J.H.3
-
19
-
-
0033896372
-
Finding the closest lattice vector when it's unusually close
-
Klein, P.N.: Finding the closest lattice vector when it's unusually close. In: SODA, pp. 937-941 (2000)
-
(2000)
SODA
, pp. 937-941
-
-
Klein, P.N.1
-
20
-
-
0000653210
-
Selecting cryptographic key sizes
-
DOI 10.1007/s00145-001-0009-4
-
Lenstra, A.K., Verheul, E.R.: Selecting cryptographic key sizes. J. Cryptology 14(4), 255-293 (2001) (Pubitemid 33770276)
-
(2001)
Journal of Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
21
-
-
77949610972
-
Public-key cryptographic primitives provably as secure as subset sum
-
Micciancio, D. (ed.) TCC 2010 Springer, Heidelberg
-
Lyubashevsky, V., Palacio, A., Segev, G.: Public-key cryptographic primitives provably as secure as subset sum. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 382-400. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5978
, pp. 382-400
-
-
Lyubashevsky, V.1
Palacio, A.2
Segev, G.3
-
22
-
-
77954639468
-
On ideal lattices and learning with errors over rings
-
Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
-
Lyubashevsky, V., Peikert, C., Regev, O.: On ideal lattices and learning with errors over rings. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 1-23. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 1-23
-
-
Lyubashevsky, V.1
Peikert, C.2
Regev, O.3
-
23
-
-
38749089099
-
Generalized compact knapsacks, cyclic lattices, and efficient oneway functions
-
Preliminary version in FOCS 2002
-
Micciancio, D.: Generalized compact knapsacks, cyclic lattices, and efficient oneway functions. Computational Complexity 16(4), 365-411 (2007); Preliminary version in FOCS 2002
-
(2007)
Computational Complexity
, vol.16
, Issue.4
, pp. 365-411
-
-
Micciancio, D.1
-
24
-
-
79951786798
-
Duality in lattice cryptography
-
(invited talk)
-
Micciancio, D.: Duality in lattice cryptography. In: Public Key Cryptography (2010) (invited talk)
-
(2010)
Public Key Cryptography
-
-
Micciancio, D.1
-
25
-
-
70350294927
-
Lattice-based cryptography
-
Springer, Heidelberg (February)
-
Micciancio, D., Regev, O.: Lattice-based cryptography. In: Post Quantum Cryptography, pp. 147-191. Springer, Heidelberg (February 2009)
-
(2009)
Post Quantum Cryptography
, pp. 147-191
-
-
Micciancio, D.1
Regev, O.2
-
26
-
-
77954710867
-
A deterministic single exponential time algorithm for most lattice problems based on Voronoi cell computations
-
Micciancio, D., Voulgaris, P.: A deterministic single exponential time algorithm for most lattice problems based on Voronoi cell computations. In: STOC, pp. 351-358 (2010)
-
(2010)
STOC
, pp. 351-358
-
-
Micciancio, D.1
Voulgaris, P.2
-
27
-
-
77951698499
-
Faster exponential time algorithms for the shortest vector problem
-
Micciancio, D., Voulgaris, P.: Faster exponential time algorithms for the shortest vector problem. In: SODA, pp. 1468-1480 (2010)
-
(2010)
SODA
, pp. 1468-1480
-
-
Micciancio, D.1
Voulgaris, P.2
-
28
-
-
70350642078
-
Public-key cryptosystems from the worst-case shortest vector problem
-
Peikert, C.: Public-key cryptosystems from the worst-case shortest vector problem. In: STOC, pp. 333-342 (2009)
-
(2009)
STOC
, pp. 333-342
-
-
Peikert, C.1
-
29
-
-
77956996919
-
An efficient and parallel gaussian sampler for lattices
-
Rabin, T. (ed.) CRYPTO 2010 Springer, Heidelberg
-
Peikert, C.: An efficient and parallel gaussian sampler for lattices. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 80-97. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 80-97
-
-
Peikert, C.1
-
30
-
-
51849126892
-
A framework for efficient and com-posable oblivious transfer
-
Wagner, D. (ed.) CRYPTO 2008 Springer, Heidelberg
-
Peikert, C., Vaikuntanathan, V., Waters, B.: A framework for efficient and com-posable oblivious transfer. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 554-571. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 554-571
-
-
Peikert, C.1
Vaikuntanathan, V.2
Waters, B.3
-
31
-
-
51849152661
-
Lossy trapdoor functions and their applications
-
Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. In: STOC, pp. 187-196 (2008)
-
(2008)
STOC
, pp. 187-196
-
-
Peikert, C.1
Waters, B.2
-
32
-
-
20444451186
-
New lattice-based cryptographic constructions
-
DOI 10.1145/1039488.1039490
-
Regev, O.: New lattice-based cryptographic constructions. J. ACM 51(6), 899-942 (2004); Preliminary version in STOC 2003 (Pubitemid 40818310)
-
(2004)
Journal of the ACM
, vol.51
, Issue.6
, pp. 899-942
-
-
Regev, O.1
-
33
-
-
70349309809
-
On lattices learning with errors random linear codes, and cryptography
-
Preliminary version in STOC 2005
-
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM 56(6), 1-40 (2009); Preliminary version in STOC 2005
-
(2009)
J. ACM
, vol.56
, Issue.6
, pp. 1-40
-
-
Regev, O.1
-
34
-
-
78650603081
-
Selecting secure parameters for lattice-based cryptography
-
Report 2010/137
-
Rückert, M., Schneider, M.: Selecting secure parameters for lattice-based cryptography. Cryptology ePrint Archive, Report 2010/137 (2010), http://eprint.iacr.org/
-
(2010)
Cryptology EPrint Archive
-
-
Rückert, M.1
Schneider, M.2
-
35
-
-
35248874386
-
Lattice reduction by random sampling and birthday methods
-
Alt, H., Habib, M. (eds.) STACS 2003 Springer, Heidelberg
-
Schnorr, C.-P.: Lattice reduction by random sampling and birthday methods. In: Alt, H., Habib, M. (eds.) STACS 2003. LNCS, vol. 2607, pp. 145-156. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2607
, pp. 145-156
-
-
Schnorr, C.-P.1
-
36
-
-
33846200465
-
Lattice basis reduction: Improved practical algorithms and solving subset sum problems
-
Schnorr, C.-P., Euchner, M.: Lattice basis reduction: Improved practical algorithms and solving subset sum problems. Mathmatical Programming 66, 181-199 (1994)
-
(1994)
Mathmatical Programming
, vol.66
, pp. 181-199
-
-
Schnorr, C.-P.1
Euchner, M.2
-
38
-
-
84937428040
-
A generalized birthday problem
-
Yung, M. (ed.) CRYPTO 2002 Springer, Heidelberg
-
Wagner, D.: A generalized birthday problem. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 288-303. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 288-303
-
-
Wagner, D.1
|