-
1
-
-
77956994704
-
Efficient lattice (H)IBE in the standard model
-
Agrawal, S., Boneh, D., Boyen, X.: Efficient lattice (H)IBE in the standard model. In: EUROCRYPT (2010)
-
(2010)
EUROCRYPT
-
-
Agrawal, S.1
Boneh, D.2
Boyen, X.3
-
4
-
-
27344461174
-
Lattice problems in NP ∩ coNP
-
Aharonov, D., Regev, O.: Lattice problems in NP ∩ coNP. Journal of the ACM 52(5), 749-765 (2005)
-
(2005)
Journal of the ACM
, vol.52
, Issue.5
, pp. 749-765
-
-
Aharonov, D.1
Regev, O.2
-
5
-
-
0002509514
-
Generating hard instances of lattice problems (extended abstract)
-
Ajtai, M.: Generating hard instances of lattice problems (extended abstract). In: STOC (1996)
-
(1996)
STOC
-
-
Ajtai, M.1
-
6
-
-
84887467921
-
Generating hard instances of the short basis problem
-
Wiedermann, J., Van Emde Boas, P., Nielsen, M. (eds.) ICALP 1999. Springer, Heidelberg
-
Ajtai, M.: Generating hard instances of the short basis problem. In: Wiedermann, J., Van Emde Boas, P., Nielsen, M. (eds.) ICALP 1999. LNCS, vol. 1644, p. 1. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1644
, pp. 1
-
-
Ajtai, M.1
-
7
-
-
70350623864
-
Generating shorter bases for hard random lattices
-
Alwen, J., Peikert, C.: Generating shorter bases for hard random lattices. In: STACS (2009)
-
(2009)
STACS
-
-
Alwen, J.1
Peikert, C.2
-
8
-
-
35048841300
-
Efficient selective-ID secure identity based encryption without random oracles
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Boneh, D., Boyen, X.: Efficient selective-ID secure identity based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
10
-
-
35248897599
-
A forward-secure public-key encryption scheme
-
Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
-
Canetti, R., Halevi, S., Katz, J.: A forward-secure public-key encryption scheme. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
11
-
-
77953487066
-
How to delegate a lattice basis
-
Report 2009/351
-
Cash, D., Hofheinz, D., Kiltz, E.: How to delegate a lattice basis. Cryptology ePrint Archive, Report 2009/351 (2009), http://eprint.iacr.org/
-
(2009)
Cryptology EPrint Archive
-
-
Cash, D.1
Hofheinz, D.2
Kiltz, E.3
-
12
-
-
44449128937
-
Predicting lattice reduction
-
DOI 10.1007/978-3-540-78967-3-3, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Gama, N., Nguyen, P.Q.: Predicting lattice reduction. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 31-51. Springer, Heidelberg (2008) (Pubitemid 351762822)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965 LNCS
, pp. 31-51
-
-
Gama, N.1
Nguyen, P.Q.2
-
13
-
-
51849137205
-
Trapdoors for hard lattices and new cryptographic constructions
-
Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: STOC (2008)
-
(2008)
STOC
-
-
Gentry, C.1
Peikert, C.2
Vaikuntanathan, V.3
-
14
-
-
70350337335
-
Short and stateless signatures from the RSA assumption
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Hohenberger, S., Waters, B.: Short and stateless signatures from the RSA assumption. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 654-670. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 654-670
-
-
Hohenberger, S.1
Waters, B.2
-
16
-
-
40249114814
-
Asymptotically efficient lattice-based digital signatures
-
Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
-
Lyubashevsky, V., Micciancio, D.: Asymptotically efficient lattice-based digital signatures. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 37-54. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 37-54
-
-
Lyubashevsky, V.1
Micciancio, D.2
-
18
-
-
17744363914
-
Worst-case to average-case reductions based on gaussian measures
-
Micciancio, D., Regev, O.: Worst-case to average-case reductions based on gaussian measures. In: FOCS (2004)
-
(2004)
FOCS
-
-
Micciancio, D.1
Regev, O.2
-
19
-
-
38749097694
-
Worst-case to average-case reductions based on Gaussian measures
-
DOI 10.1137/S0097539705447360
-
Micciancio, D., Regev, O.:Worst-case to average-case reductions based on Gaussian measures. SIAM Journal of Computing 37(1), 267-302 (2007) (Pubitemid 351321997)
-
(2007)
SIAM Journal on Computing
, vol.37
, Issue.1
, pp. 267-302
-
-
Micciancio, D.1
Regev, O.2
-
20
-
-
77949297748
-
Lattice-based cryptography
-
Bernstein, D.J., Buchmann, J. (eds.), Springer, Heidelberg
-
Micciancio, D., Regev, O.: Lattice-based cryptography. In: Bernstein, D.J., Buchmann, J. (eds.) Post-quantum Cryptography. Springer, Heidelberg (2008)
-
(2008)
Post-quantum Cryptography
-
-
Micciancio, D.1
Regev, O.2
-
21
-
-
77953509279
-
Bonsai trees (or, arboriculture in lattice-based cryptography)
-
Report 2009/359
-
Peikert, C.: Bonsai trees (or, arboriculture in lattice-based cryptography). Cryptology ePrint Archive, Report 2009/359 (2009), http://eprint.iacr.org/
-
(2009)
Cryptology EPrint Archive
-
-
Peikert, C.1
-
22
-
-
33745559478
-
Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices
-
DOI 10.1007/11681878-8, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
Peikert, C., Rosen, A.: Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 145-166. Springer, Heidelberg (2006) (Pubitemid 43979848)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3876 LNCS
, pp. 145-166
-
-
Peikert, C.1
Rosen, A.2
-
23
-
-
33745571012
-
On lattices learning with errors random linear codes, and cryptography
-
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: STOC (2005)
-
(2005)
STOC
-
-
Regev, O.1
-
24
-
-
24944566040
-
Efficient Identity-Based Encryption without random oracles
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005) (Pubitemid 41313949)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 114-127
-
-
Waters, B.1
|