-
1
-
-
77954625601
-
Efficient Lattice (H)IBE in the Standard Model
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Agrawal, S., Boneh, D., Boyen, X.: Efficient Lattice (H)IBE in the Standard Model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 553-572. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 553-572
-
-
Agrawal, S.1
Boneh, D.2
Boyen, X.3
-
2
-
-
77957015647
-
Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Agrawal, S., Boneh, D., Boyen, X.: Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 98-115. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 98-115
-
-
Agrawal, S.1
Boneh, D.2
Boyen, X.3
-
4
-
-
0344550526
-
Proving Hard-Core Predicates Using List Decoding
-
Akavia, A., Goldwasser, S., Safra, S.: Proving Hard-Core Predicates Using List Decoding. In: FOCS, pp. 146-157 (2003)
-
(2003)
FOCS
, pp. 146-157
-
-
Akavia, A.1
Goldwasser, S.2
Safra, S.3
-
5
-
-
70350627587
-
Simultaneous Hardcore Bits and Cryptography against Memory Attacks
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous Hardcore Bits and Cryptography against Memory Attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 474-495. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 474-495
-
-
Akavia, A.1
Goldwasser, S.2
Vaikuntanathan, V.3
-
6
-
-
70350342511
-
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 595-618. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 595-618
-
-
Applebaum, B.1
Cash, D.2
Peikert, C.3
Sahai, A.4
-
7
-
-
80051978292
-
New algorithms for learning in presence of errors
-
Arora, S., Ge, R.: New algorithms for learning in presence of errors. In: ICALP (2011), http://www.eccc.uni-trier.de/report/2010/066/
-
(2011)
ICALP
-
-
Arora, S.1
Ge, R.2
-
8
-
-
0028062299
-
Weakly Learning DNF and Characterizing Statistical Query Learning using Fourier Analysis
-
Blum, A., Furst, M.L., Jackson, J.C., Kearns, M.J., Mansour, Y., Rudich, S.: Weakly Learning DNF and Characterizing Statistical Query Learning using Fourier Analysis. In: STOC, pp. 253-262 (1994)
-
(1994)
STOC
, pp. 253-262
-
-
Blum, A.1
Furst, M.L.2
Jackson, J.C.3
Kearns, M.J.4
Mansour, Y.5
Rudich, S.6
-
9
-
-
84877639283
-
Cryptographic Primitives Based on Hard Learning Problems
-
Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
-
Blum, A., Furst, M.L., Kearns, M. J., Lipton, R.J.: Cryptographic Primitives Based on Hard Learning Problems. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 278-291. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 278-291
-
-
Blum, A.1
Furst, M.L.2
Kearns, M.J.3
Lipton, R.J.4
-
10
-
-
77954654490
-
Bonsai Trees, or How to Delegate a Lattice Basis
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Cash, D., Hofheinz, D., Kiltz, E., Peikert, C.: Bonsai Trees, or How to Delegate a Lattice Basis. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 523-552. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 523-552
-
-
Cash, D.1
Hofheinz, D.2
Kiltz, E.3
Peikert, C.4
-
11
-
-
77949580684
-
Public-Key Encryption Schemes with Auxiliary Inputs
-
Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
-
Dodis, Y., Goldwasser, S., Tauman Kalai, Y., Peikert, C., Vaikuntanathan, V.: Public-Key Encryption Schemes with Auxiliary Inputs. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 361-381. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5978
, pp. 361-381
-
-
Dodis, Y.1
Goldwasser, S.2
Tauman Kalai, Y.3
Peikert, C.4
Vaikuntanathan, V.5
-
12
-
-
84947905764
-
An efficient pseudo-random generator provably as secure as syndrome decoding
-
Maurer, U.M. (ed.) EUROCRYPT 1996. Springer, Heidelberg
-
Fischer, J.-B., Stern, J.: An efficient pseudo-random generator provably as secure as syndrome decoding. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 245-255. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 245-255
-
-
Fischer, J.-B.1
Stern, J.2
-
13
-
-
77954628604
-
A Simple BGN-Type Cryptosystem from LWE
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Gentry, C., Halevi, S., Vaikuntanathan, V.: A Simple BGN-Type Cryptosystem from LWE. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 506-522. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 506-522
-
-
Gentry, C.1
Halevi, S.2
Vaikuntanathan, V.3
-
14
-
-
51849137205
-
Trapdoors for Hard Lattices and New Cryptographic Constructions
-
ACM, New York
-
Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for Hard Lattices and New Cryptographic Constructions. In: STOC, pp. 197-206. ACM, New York (2008)
-
(2008)
STOC
, pp. 197-206
-
-
Gentry, C.1
Peikert, C.2
Vaikuntanathan, V.3
-
15
-
-
0024868772
-
A Hard-Core Predicate for All One-Way Functions
-
Goldreich, O., Levin, L.A.: A Hard-Core Predicate for All One-Way Functions. In: STOC, pp. 25-32 (1989)
-
(1989)
STOC
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.A.2
-
16
-
-
77955260391
-
Robustness of the Learning with Errors Assumption
-
Goldwasser, S., Kalai, Y.T., Peikert, C., Vaikuntanathan, V.: Robustness of the Learning with Errors Assumption. In: ICS (2010)
-
(2010)
ICS
-
-
Goldwasser, S.1
Kalai, Y.T.2
Peikert, C.3
Vaikuntanathan, V.4
-
17
-
-
0024771884
-
How to Recycle Random Bits
-
IEEE Computer Society, Washington, DC, USA
-
Impagliazzo, R., Zuckerman, D.: How to Recycle Random Bits. In: FOCS, pp. 248-253. IEEE Computer Society, Washington, DC, USA (1989)
-
(1989)
FOCS
, pp. 248-253
-
-
Impagliazzo, R.1
Zuckerman, D.2
-
18
-
-
0001143795
-
Efficient Cryptographic Schemes Provably as Secure as Subset Sum
-
Impagliazzo, R., Naor, M.: Efficient Cryptographic Schemes Provably as Secure as Subset Sum. J. Cryptology 9(4), 199-216 (1996)
-
(1996)
J. Cryptology
, vol.9
, Issue.4
, pp. 199-216
-
-
Impagliazzo, R.1
Naor, M.2
-
19
-
-
77954759293
-
Parallel and Concurrent Security of the HB and HB+ Protocols
-
Katz, J., Shin, J.S., Smith, A.: Parallel and Concurrent Security of the HB and HB+ Protocols. J. Cryptology 23(3), 402-421 (2010)
-
(2010)
J. Cryptology
, vol.23
, Issue.3
, pp. 402-421
-
-
Katz, J.1
Shin, J.S.2
Smith, A.3
-
20
-
-
38049064421
-
Multi-bit cryptosystems based on lattice problems
-
Okamoto, T., Wang, X. (eds.) PKC 2007. Springer, Heidelberg
-
Kawachi, A., Tanaka, K., Xagawa, K.: Multi-bit cryptosystems based on lattice problems. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 315-329. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4450
, pp. 315-329
-
-
Kawachi, A.1
Tanaka, K.2
Xagawa, K.3
-
21
-
-
85006528164
-
Learning Decision Trees Using the Fourier Sprectrum
-
Kushilevitz, E., Mansour, Y.: Learning Decision Trees Using the Fourier Sprectrum. In: STOC, pp. 455-464 (1991)
-
(1991)
STOC
, pp. 455-464
-
-
Kushilevitz, E.1
Mansour, Y.2
-
22
-
-
79951793525
-
Better Key Sizes (and Attacks) for LWE-Based Encryption
-
Kiayias, A. (ed.) CT-RSA 2011. Springer, Heidelberg
-
Lindner, R., Peikert, C.: Better Key Sizes (and Attacks) for LWE-Based Encryption. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 319-339. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6558
, pp. 319-339
-
-
Lindner, R.1
Peikert, C.2
-
23
-
-
70350336456
-
On bounded distance decoding, unique shortest vectors, and the minimum distance problem
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Lyubashevsky, V., Micciancio, D.: On bounded distance decoding, unique shortest vectors, and the minimum distance problem. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 577-594. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 577-594
-
-
Lyubashevsky, V.1
Micciancio, D.2
-
24
-
-
77954639468
-
On Ideal Lattices and Learning with Errors over Rings
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Lyubashevsky, V., Peikert, C., Regev, O.: On Ideal Lattices and Learning with Errors over Rings. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 1-23. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 1-23
-
-
Lyubashevsky, V.1
Peikert, C.2
Regev, O.3
-
25
-
-
79951786798
-
Duality in Lattice Based Cryptography
-
invited talk
-
Micciancio, D.: Duality in Lattice Based Cryptography. In: Public Key Cryptography (2010) (invited talk)
-
(2010)
Public Key Cryptography
-
-
Micciancio, D.1
-
26
-
-
70350294927
-
Lattice-Based Cryptography
-
Springer Publishing Company, Heidelberg
-
Micciancio, D., Regev, O.: Lattice-Based Cryptography. In: Post Quantum Cryptography, pp. 147-191. Springer Publishing Company, Heidelberg (2009)
-
(2009)
Post Quantum Cryptography
, pp. 147-191
-
-
Micciancio, D.1
Regev, O.2
-
27
-
-
0038784670
-
Learning Juntas
-
Mossel, E., O'Donnell, R., Servedio, R.A.: Learning Juntas. In: STOC, pp. 206-212 (2003)
-
(2003)
STOC
, pp. 206-212
-
-
Mossel, E.1
O'Donnell, R.2
Servedio, R.A.3
-
28
-
-
70350642078
-
Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem
-
ACM, New York
-
Peikert, C.: Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem. In: STOC, pp. 333-342. ACM, New York (2009)
-
(2009)
STOC
, pp. 333-342
-
-
Peikert, C.1
-
29
-
-
51849126892
-
A Framework for Efficient and Composable Oblivious Transfer
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Peikert, C., Vaikuntanathan, V., Waters, B.: A Framework for Efficient and Composable Oblivious Transfer. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 554-571. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 554-571
-
-
Peikert, C.1
Vaikuntanathan, V.2
Waters, B.3
-
30
-
-
51849152661
-
Lossy Trapdoor Functions and Their Applications
-
ACM, New York
-
Peikert, C., Waters, B.: Lossy Trapdoor Functions and Their Applications. In: STOC, pp. 187-196. ACM, New York (2008)
-
(2008)
STOC
, pp. 187-196
-
-
Peikert, C.1
Waters, B.2
-
31
-
-
70349309809
-
On lattices, learning with errors, random linear codes, and cryptography
-
Preliminary version in STOC 2005
-
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. Journal of ACM 56(6), 34 (2009); Preliminary version in STOC 2005
-
(2009)
Journal of ACM
, vol.56
, Issue.6
, pp. 34
-
-
Regev, O.1
-
32
-
-
77955253445
-
The Learning with Errors Problem
-
Invited Survey
-
Regev, O.: The Learning with Errors Problem (Invited Survey). In: IEEE Conference on Computational Complexity, pp. 191-204 (2010)
-
(2010)
IEEE Conference on Computational Complexity
, pp. 191-204
-
-
Regev, O.1
-
33
-
-
80052005297
-
Estimating the Security of Lattice-based Cryptosystems
-
Technical Report 2010/137
-
Rückert, M., Schneider, M.: Estimating the Security of Lattice-based Cryptosystems. Technical Report 2010/137, IACR ePrint archive (2010)
-
(2010)
IACR EPrint Archive
-
-
Rückert, M.1
Schneider, M.2
-
35
-
-
72449142727
-
Efficient Public Key Encryption Based on Ideal Lattices
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Stehlé, D., Steinfeld, R., Tanaka, K., Xagawa, K.: Efficient Public Key Encryption Based on Ideal Lattices. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 617-635. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 617-635
-
-
Stehlé, D.1
Steinfeld, R.2
Tanaka, K.3
Xagawa, K.4
|