-
1
-
-
77954751550
-
Public-key cryptography from different assumptions
-
Schulman, L.J. (ed.) ACM Press
-
Applebaum, B., Barak, B., Wigderson, A.: Public-key cryptography from different assumptions. In: Schulman, L.J. (ed.) 42nd ACM STOC, pp. 171-180. ACM Press (2010)
-
(2010)
42nd ACM STOC
, pp. 171-180
-
-
Applebaum, B.1
Barak, B.2
Wigderson, A.3
-
2
-
-
70350342511
-
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 595-618. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 595-618
-
-
Applebaum, B.1
Cash, D.2
Peikert, C.3
Sahai, A.4
-
3
-
-
79960014155
-
New Algorithms for Learning in Presence of Errors
-
Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Springer, Heidelberg
-
Arora, S., Ge, R.: New Algorithms for Learning in Presence of Errors. In: Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part I. LNCS, vol. 6755, pp. 403-415. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6755
, Issue.PART I
, pp. 403-415
-
-
Arora, S.1
Ge, R.2
-
4
-
-
0344118879
-
More on average case vs approximation complexity
-
IEEE Computer Society Press
-
Alekhnovich, M.: More on average case vs approximation complexity. In: 44th FOCS, pp. 298-307. IEEE Computer Society Press (2003)
-
(2003)
44th FOCS
, pp. 298-307
-
-
Alekhnovich, M.1
-
5
-
-
84877639283
-
Cryptographic Primitives Based on Hard Learning Problems
-
Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
-
Blum, A., Furst, M.L., Kearns, M.J., Lipton, R.J.: Cryptographic Primitives Based on Hard Learning Problems. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 278-291. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 278-291
-
-
Blum, A.1
Furst, M.L.2
Kearns, M.J.3
Lipton, R.J.4
-
6
-
-
24144453496
-
Noise-tolerant learning, the parity problem, and the statistical query model
-
Blum, A., Adam Kalai, A., Wasserman, H.: Noise-tolerant learning, the parity problem, and the statistical query model. J. ACM 50(4), 506-519 (2003)
-
(2003)
J. ACM
, vol.50
, Issue.4
, pp. 506-519
-
-
Blum, A.1
Adam Kalai, A.2
Wasserman, H.3
-
7
-
-
0017973512
-
On the inherent intractability of certain coding problems
-
Berlekamp, E.R., McEliece, R.J., van Tilborg, H.C.A.: On the inherent intractability of certain coding problems. IEEE Trans. Information Theory IT-24(3), 384-386 (1978)
-
(1978)
IEEE Trans. Information Theory
, vol.IT-24
, Issue.3
, pp. 384-386
-
-
Berlekamp, E.R.1
McEliece, R.J.2
Van Tilborg, H.C.A.3
-
8
-
-
84856028219
-
-
Cryptology ePrint Archive, Report 2011/401
-
Banerjee, A., Peikert, C., Rosen, A.: Pseudorandom functions and lattices. Cryptology ePrint Archive, Report 2011/401 (2011), http://eprint.iacr.org/
-
(2011)
Pseudorandom Functions and Lattices
-
-
Banerjee, A.1
Peikert, C.2
Rosen, A.3
-
9
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Ashby, V. (ed.) ACM Press
-
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Ashby, V. (ed.) ACM CCS 1993, pp. 62-73. ACM Press (1993)
-
(1993)
ACM CCS 1993
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
10
-
-
77954654490
-
Bonsai Trees, or How to Delegate a Lattice Basis
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Cash, D., Hofheinz, D., Kiltz, E., Peikert, C.: Bonsai Trees, or How to Delegate a Lattice Basis. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 523-552. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 523-552
-
-
Cash, D.1
Hofheinz, D.2
Kiltz, E.3
Peikert, C.4
-
11
-
-
44449176564
-
The Twin Diffie-Hellman Problem and Applications
-
Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
-
Cash, D., Kiltz, E., Shoup, V.: The Twin Diffie-Hellman Problem and Applications. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 127-145. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 127-145
-
-
Cash, D.1
Kiltz, E.2
Shoup, V.3
-
12
-
-
0001555328
-
Rapid multiplication of rectangular matrices
-
Coppersmith, D.: Rapid multiplication of rectangular matrices. SIAM J. Comput. 11(3), 467-471 (1982)
-
(1982)
SIAM J. Comput.
, vol.11
, Issue.3
, pp. 467-471
-
-
Coppersmith, D.1
-
13
-
-
84856045336
-
-
revisited manuscript
-
Dodis, Y., Kiltz, E., Pietrzak, K., Wichs, D.: Message authentication, revisited (manuscript, 2011)
-
(2011)
Message Authentication
-
-
Dodis, Y.1
Kiltz, E.2
Pietrzak, K.3
Wichs, D.4
-
14
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31, 469-472 (1985)
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
ElGamal, T.1
-
15
-
-
34547698378
-
New results for learning noisy parities and halfspaces
-
IEEE Computer Society Press
-
Feldman, V., Gopalan, P., Khot, S., Ponnuswami, A.K.: New results for learning noisy parities and halfspaces. In: 47th FOCS, pp. 563-574. IEEE Computer Society Press (2006)
-
(2006)
47th FOCS
, pp. 563-574
-
-
Feldman, V.1
Gopalan, P.2
Khot, S.3
Ponnuswami, A.K.4
-
16
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
Mitzenmacher, M. (ed.) ACM Press
-
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Mitzenmacher, M. (ed.) 41st ACM STOC, pp. 169-178. ACM Press (2009)
-
(2009)
41st ACM STOC
, pp. 169-178
-
-
Gentry, C.1
-
17
-
-
0022793132
-
How to construct random functions
-
Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. Journal of the ACM 33, 792-807 (1986)
-
(1986)
Journal of the ACM
, vol.33
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
18
-
-
77955260391
-
Robustness of the learning with errors assumption
-
Goldwasser, S., Kalai, Y.T., Peikert, C., Vaikuntanathan, V.: Robustness of the learning with errors assumption. In: ICS, pp. 230-240 (2010)
-
(2010)
ICS
, pp. 230-240
-
-
Goldwasser, S.1
Kalai, Y.T.2
Peikert, C.3
Vaikuntanathan, V.4
-
19
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM Journal on Computing 18(1), 186-208 (1989)
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
20
-
-
71149116146
-
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
-
Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. Journal of the ACM 38(3), 691-729 (1991)
-
(1991)
Journal of the ACM
, vol.38
, Issue.3
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
21
-
-
51849137205
-
Trapdoors for hard lattices and new cryptographic constructions
-
Ladner, R.E., Dwork, C. (eds.) ACM Press
-
Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Ladner, R.E., Dwork, C. (eds.) 40th ACM STOC, pp. 197-206. ACM Press (2008)
-
(2008)
40th ACM STOC
, pp. 197-206
-
-
Gentry, C.1
Peikert, C.2
Vaikuntanathan, V.3
-
22
-
-
33144487342
-
-
Cryptology ePrint Archive, Report 2005/237
-
Gilbert, H., Robshaw, M., Sibert, H.: An active attack against hb+ - a provably secure lightweight authentication protocol. Cryptology ePrint Archive, Report 2005/237 (2005), http://eprint.iacr.org/
-
(2005)
An Active Attack Against Hb+ - A Provably Secure Lightweight Authentication Protocol
-
-
Gilbert, H.1
Robshaw, M.2
Sibert, H.3
-
23
-
-
44449155290
-
+
-
Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
-
+. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 361-378. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 361-378
-
-
Gilbert, H.1
Robshaw, M.J.B.2
Seurin, Y.3
-
24
-
-
49149109143
-
How to Encrypt with the LPN Problem
-
Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Springer, Heidelberg
-
Gilbert, H., Robshaw, M.J.B., Seurin, Y.: How to Encrypt with the LPN Problem. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 679-690. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5126
, Issue.PART II
, pp. 679-690
-
-
Gilbert, H.1
Robshaw, M.J.B.2
Seurin, Y.3
-
25
-
-
70349284581
-
Secure Human Identification Protocols
-
Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
-
Hopper, N.J., Blum, M.: Secure Human Identification Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52-66. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.2
-
26
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
Håstad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A pseudorandom generator from any one-way function. SIAM Journal on Computing 28(4), 1364-1396 (1999)
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
27
-
-
84856034838
-
-
manuscript
-
Heyse, S., Kiltz, E., Lyubashevsky, V., Paar, C., Pietrzak, K.: An efficient authentication protocol based on ring-lpn (manuscript, 2011)
-
(2011)
An Efficient Authentication Protocol Based on Ring-lpn
-
-
Heyse, S.1
Kiltz, E.2
Lyubashevsky, V.3
Paar, C.4
Pietrzak, K.5
-
29
-
-
33745181952
-
Authenticating Pervasive Devices with Human Protocols
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Juels, A., Weis, S.A.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293-308. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 293-308
-
-
Juels, A.1
Weis, S.A.2
-
30
-
-
79957999442
-
Efficient Authentication from Hard Learning Problems
-
Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
-
Kiltz, E., Pietrzak, K., Cash, D., Jain, A., Venturi, D.: Efficient Authentication from Hard Learning Problems. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 7-26. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
, pp. 7-26
-
-
Kiltz, E.1
Pietrzak, K.2
Cash, D.3
Jain, A.4
Venturi, D.5
-
31
-
-
77954759293
-
Parallel and concurrent security of the HB and HB+ protocols
-
Katz, J., Shin, J.S., Smith, A.: Parallel and concurrent security of the HB and HB+ protocols. Journal of Cryptology 23(3), 402-421 (2010)
-
(2010)
Journal of Cryptology
, vol.23
, Issue.3
, pp. 402-421
-
-
Katz, J.1
Shin, J.S.2
Smith, A.3
-
32
-
-
33749998666
-
An Improved LPN Algorithm
-
De Prisco, R., Yung, M. (eds.) SCN 2006. Springer, Heidelberg
-
Levieil, É., Fouque, P.-A.: An Improved LPN Algorithm. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 348-359. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4116
, pp. 348-359
-
-
Levieil, É.1
Fouque, P.-A.2
-
33
-
-
50249148926
-
SWIFFT: A Modest Proposal for FFT Hashing
-
Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
-
Lyubashevsky, V., Micciancio, D., Peikert, C., Rosen, A.: SWIFFT: A Modest Proposal for FFT Hashing. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 54-72. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5086
, pp. 54-72
-
-
Lyubashevsky, V.1
Micciancio, D.2
Peikert, C.3
Rosen, A.4
-
34
-
-
77954639468
-
On Ideal Lattices and Learning with Errors over Rings
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Lyubashevsky, V., Peikert, C., Regev, O.: On Ideal Lattices and Learning with Errors Over Rings. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 1-23. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 1-23
-
-
Lyubashevsky, V.1
Peikert, C.2
Regev, O.3
-
35
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing 17(2) (1988)
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
-
-
Luby, M.1
Rackoff, C.2
-
36
-
-
26944487960
-
The Parity Problem in the Presence of Noise, Decoding Random Linear Codes, and the Subset Sum Problem
-
Chekuri, C., Jansen, K., Rolim, J.D.P., Trevisan, L. (eds.) APPROX 2005 and RANDOM 2005. Springer, Heidelberg
-
Lyubashevsky, V.: The Parity Problem in the Presence of Noise, Decoding Random Linear Codes, and the Subset Sum Problem. In: Chekuri, C., Jansen, K., Rolim, J.D.P., Trevisan, L. (eds.) APPROX 2005 and RANDOM 2005. LNCS, vol. 3624, pp. 378-389. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3624
, pp. 378-389
-
-
Lyubashevsky, V.1
-
37
-
-
0002448405
-
A Public-Key Cryptosystem Based on Algebraic Coding Theory
-
McEliece, R.J.: A Public-Key Cryptosystem Based On Algebraic Coding Theory. Deep Space Network Progress Report 44, 114-116 (1978)
-
(1978)
Deep Space Network Progress Report
, vol.44
, pp. 114-116
-
-
McEliece, R.J.1
-
39
-
-
0032647187
-
Synthesizers and their application to the parallel construction of pseudo-random functions
-
Naor, M., Reingold, O.: Synthesizers and their application to the parallel construction of pseudo-random functions. J. Comput. Syst. Sci. 58(2), 336-375 (1999)
-
(1999)
J. Comput. Syst. Sci.
, vol.58
, Issue.2
, pp. 336-375
-
-
Naor, M.1
Reingold, O.2
-
40
-
-
70350642078
-
Public-key cryptosystems from the worst-case shortest vector problem: Extended abstract
-
Mitzenmacher, M. (ed.) ACM Press
-
Peikert, C.: Public-key cryptosystems from the worst-case shortest vector problem: extended abstract. In: Mitzenmacher, M. (ed.) 41st ACM STOC, pp. 333-342. ACM Press (2009)
-
(2009)
41st ACM STOC
, pp. 333-342
-
-
Peikert, C.1
-
42
-
-
84867955018
-
A new np-complete problem and public-key identification
-
Pointcheval, D., Poupard, G.: A new np-complete problem and public-key identification. Des. Codes Cryptography 28(1), 5-31 (2003)
-
(2003)
Des. Codes Cryptography
, vol.28
, Issue.1
, pp. 5-31
-
-
Pointcheval, D.1
Poupard, G.2
-
43
-
-
33745571012
-
On lattices, learning with errors, random linear codes, and cryptography
-
Gabow, H.N., Fagin, R. (eds.) ACM Press
-
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: Gabow, H.N., Fagin, R. (eds.) 37th ACM STOC, pp. 84-93. ACM Press (2005)
-
(2005)
37th ACM STOC
, pp. 84-93
-
-
Regev, O.1
-
44
-
-
77955253445
-
The learning with errors problem (invited survey)
-
Regev, O.: The learning with errors problem (invited survey). In: IEEE Conference on Computational Complexity, pp. 191-204 (2010)
-
(2010)
IEEE Conference on Computational Complexity
, pp. 191-204
-
-
Regev, O.1
-
45
-
-
0000537828
-
Efficient Identification and Signatures for Smart Cards
-
Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
-
Schnorr, C.-P.: Efficient Identification and Signatures for Smart Cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239-252. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 239-252
-
-
Schnorr, C.-P.1
-
46
-
-
85032871579
-
An Efficient Identification Scheme based on Permuted Kernels
-
(Extended Abstract). Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
-
Shamir, A.: An Efficient Identification Scheme based on Permuted Kernels (Extended Abstract). In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 606-609. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 606-609
-
-
Shamir, A.1
-
47
-
-
84964937021
-
A Method for Finding Codewords of Small Weight
-
Cohen, G., Godlewski, P. (eds.) Coding Theory 1986. Springer, Heidelberg
-
Stern, J.: A Method for Finding Codewords of Small Weight. In: Cohen, G., Godlewski, P. (eds.) Coding Theory 1986. LNCS, vol. 311, pp. 106-113. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.311
, pp. 106-113
-
-
Stern, J.1
-
48
-
-
84955595109
-
A New Identification Scheme Based on Syndrome Decoding
-
Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
-
Stern, J.: A New Identification Scheme Based on Syndrome Decoding. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 13-21. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 13-21
-
-
Stern, J.1
|