-
1
-
-
77954625601
-
Efficient lattice (H)IBE in the standard model
-
Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
-
Agrawal, S., Boneh, D., Boyen, X.: Efficient Lattice (H)IBE in the Standard Model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 553-572. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 553-572
-
-
Agrawal, S.1
Boneh, D.2
Boyen, X.3
-
2
-
-
77957015647
-
Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE
-
Rabin, T. (ed.) CRYPTO 2010 Springer, Heidelberg
-
Agrawal, S., Boneh, D., Boyen, X.: Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 98-115. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 98-115
-
-
Agrawal, S.1
Boneh, D.2
Boyen, X.3
-
3
-
-
38749147177
-
Generating hard instances of lattice problems
-
Preliminary version in STOC 1996
-
Ajtai, M.: Generating hard instances of lattice problems. Quaderni di Matematica 13, 1-32 (2004); Preliminary version in STOC 1996
-
(2004)
Quaderni di Matematica
, vol.13
, pp. 1-32
-
-
Ajtai, M.1
-
4
-
-
70350342511
-
Fast cryptographic primitives and circular-secure encryption based on hard learning problems
-
Halevi, S. (ed.) CRYPTO 2009 Springer, Heidelberg
-
Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 595-618. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 595-618
-
-
Applebaum, B.1
Cash, D.2
Peikert, C.3
Sahai, A.4
-
5
-
-
79960014155
-
New algorithms for learning in presence of errors
-
Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part I Springer, Heidelberg
-
Arora, S., Ge, R.: New Algorithms for Learning in Presence of Errors. In: Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part I. LNCS, vol. 6755, pp. 403-415. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6755
, pp. 403-415
-
-
Arora, S.1
Ge, R.2
-
6
-
-
84859946594
-
-
manuscript
-
Banerjee, A., Ben-Zvi, N., Peikert, C., Rosen, A.: SPRINT: Efficient pseudorandomness via rounded integer products (2011) (manuscript)
-
(2011)
SPRINT: Efficient Pseudorandomness Via Rounded Integer Products
-
-
Banerjee, A.1
Ben-Zvi, N.2
Peikert, C.3
Rosen, A.4
-
7
-
-
84856028219
-
Pseudorandom functions and lattices
-
Banerjee, A., Peikert, C., Rosen, A.: Pseudorandom functions and lattices. Cryptology ePrint Archive, Report 2011/401 (2011), http://eprint.iacr.org/
-
(2011)
Cryptology EPrint Archive, Report 2011/401
-
-
Banerjee, A.1
Peikert, C.2
Rosen, A.3
-
8
-
-
24144453496
-
Noise-tolerant learning, the parity problem, and the statistical query model
-
Blum, A., Kalai, A., Wasserman, H.: Noise-tolerant learning, the parity problem, and the statistical query model. J. ACM 50(4), 506-519 (2003)
-
(2003)
J. ACM
, vol.50
, Issue.4
, pp. 506-519
-
-
Blum, A.1
Kalai, A.2
Wasserman, H.3
-
9
-
-
78650021967
-
Algebraic pseudorandom functions with improved efficiency from the augmented cascade
-
Boneh, D., Montgomery, H.W., Raghunathan, A.: Algebraic pseudorandom functions with improved efficiency from the augmented cascade. In: ACM Conference on Computer and Communications Security, pp. 131-140 (2010)
-
(2010)
ACM Conference on Computer and Communications Security
, pp. 131-140
-
-
Boneh, D.1
Montgomery, H.W.2
Raghunathan, A.3
-
10
-
-
84857756269
-
Fully homomorphic encryption without bootstrapping
-
Brakerski, Z., Gentry, C., Vaikuntanathan, V.: Fully homomorphic encryption without bootstrapping. Cryptology ePrint Archive, Report 2011/277 (2011), http://eprint.iacr.org/
-
(2011)
Cryptology EPrint Archive, Report 2011/277
-
-
Brakerski, Z.1
Gentry, C.2
Vaikuntanathan, V.3
-
11
-
-
80955132201
-
Efficient fully homomorphic encryption from (standard) LWE
-
Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. In: FOCS, pp. 97-106 (2011)
-
(2011)
FOCS
, pp. 97-106
-
-
Brakerski, Z.1
Vaikuntanathan, V.2
-
12
-
-
80051986706
-
Fully homomorphic encryption from Ring-LWE and security for key dependent messages
-
Rogaway, P. (ed.) CRYPTO 2011 Springer, Heidelberg
-
Brakerski, Z., Vaikuntanathan, V.: Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 505-524. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6841
, pp. 505-524
-
-
Brakerski, Z.1
Vaikuntanathan, V.2
-
13
-
-
77954654490
-
Bonsai trees, or how to delegate a lattice basis
-
Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
-
Cash, D., Hofheinz, D., Kiltz, E., Peikert, C.: Bonsai Trees, or How to Delegate a Lattice Basis. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 523-552. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 523-552
-
-
Cash, D.1
Hofheinz, D.2
Kiltz, E.3
Peikert, C.4
-
14
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC, pp. 169-178 (2009)
-
(2009)
STOC
, pp. 169-178
-
-
Gentry, C.1
-
15
-
-
51849137205
-
Trapdoors for hard lattices and new cryptographic constructions
-
Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: STOC, pp. 197-206 (2008)
-
(2008)
STOC
, pp. 197-206
-
-
Gentry, C.1
Peikert, C.2
Vaikuntanathan, V.3
-
16
-
-
0022793132
-
How to construct random functions
-
Preliminary version in FOCS 1984
-
Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM 33(4), 792-807 (1986); Preliminary version in FOCS 1984
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
17
-
-
77955260391
-
Robustness of the learning with errors assumption
-
Goldwasser, S., Kalai, Y.T., Peikert, C., Vaikuntanathan, V.: Robustness of the learning with errors assumption. In: ICS, pp. 230-240 (2010)
-
(2010)
ICS
, pp. 230-240
-
-
Goldwasser, S.1
Kalai, Y.T.2
Peikert, C.3
Vaikuntanathan, V.4
-
18
-
-
70349284581
-
Secure human identification protocols
-
Boyd, C. (ed.) ASIACRYPT 2001 Springer, Heidelberg
-
Hopper, N.J., Blum, M.: Secure Human Identification Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52-66. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.2
-
19
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
Shoup, V. (ed.) CRYPTO 2005 Springer, Heidelberg
-
Juels, A., Weis, S.A.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293-308. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 293-308
-
-
Juels, A.1
Weis, S.A.2
-
20
-
-
77954759293
-
Parallel and concurrent security of the HB and HB+ protocols
-
Preliminary version in Eurocrypt
-
Katz, J., Shin, J.S., Smith, A.: Parallel and concurrent security of the HB and HB+ protocols. J. Cryptology 23(3), 402-421 (2010); Preliminary version in Eurocrypt 2006
-
(2010)
J. Cryptology
, vol.23
, Issue.3
, pp. 402-421
-
-
Katz, J.1
Shin, J.S.2
Smith, A.3
-
21
-
-
79957999442
-
Efficient authentication from hard learning problems
-
Paterson, K.G. (ed.) EUROCRYPT 2011 Springer, Heidelberg
-
Kiltz, E., Pietrzak, K., Cash, D., Jain, A., Venturi, D.: Efficient Authentication from Hard Learning Problems. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 7-26. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
, pp. 7-26
-
-
Kiltz, E.1
Pietrzak, K.2
Cash, D.3
Jain, A.4
Venturi, D.5
-
22
-
-
34250244723
-
Factoring polynomials with rational coefficients
-
Lenstra, A.K., Lenstra Jr., H.W., Lovasz, L.: Factoring polynomials with rational coefficients. Mathematische Annalen 261(4), 515-534 (1982)
-
(1982)
Mathematische Annalen
, vol.261
, Issue.4
, pp. 515-534
-
-
Lenstra, A.K.1
Lenstra Jr., H.W.2
Lovasz, L.3
-
23
-
-
74049161603
-
Efficient pseudorandom functions from the decisional linear assumption and weaker variants
-
Lewko, A.B., Waters, B.: Efficient pseudorandom functions from the decisional linear assumption and weaker variants. In: ACM Conference on Computer and Communications Security, pp. 112-120 (2009)
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 112-120
-
-
Lewko, A.B.1
Waters, B.2
-
24
-
-
50249148926
-
SWIFFT: A modest proposal for FFT hashing
-
Nyberg, K. (ed.) FSE 2008 Springer, Heidelberg
-
Lyubashevsky, V., Micciancio, D., Peikert, C., Rosen, A.: SWIFFT: A Modest Proposal for FFT Hashing. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 54-72. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5086
, pp. 54-72
-
-
Lyubashevsky, V.1
Micciancio, D.2
Peikert, C.3
Rosen, A.4
-
25
-
-
77954639468
-
On ideal lattices and learning with errors over rings
-
Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
-
Lyubashevsky, V., Peikert, C., Regev, O.: On Ideal Lattices and Learning with Errors over Rings. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 1-23. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 1-23
-
-
Lyubashevsky, V.1
Peikert, C.2
Regev, O.3
-
26
-
-
80051960879
-
Pseudorandom knapsacks and the sample complexity of LWE Search-to-decision reductions
-
Rogaway, P. (ed.) CRYPTO 2011 Springer, Heidelberg
-
Micciancio, D., Mol, P.: Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 465-484. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6841
, pp. 465-484
-
-
Micciancio, D.1
Mol, P.2
-
27
-
-
84859976564
-
Trapdoors for lattices: Simpler, tighter, faster, smaller
-
Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012 Springer, Heidelberg
-
Micciancio, D., Peikert, C.: Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 700-718. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7237
, pp. 700-718
-
-
Micciancio, D.1
Peikert, C.2
-
28
-
-
0032647187
-
Synthesizers and their application to the parallel construction of pseudo-random functions
-
Preliminary version in FOCS 1995
-
Naor, M., Reingold, O.: Synthesizers and their application to the parallel construction of pseudo-random functions. J. Comput. Syst. Sci. 58(2), 336-375 (1999); Preliminary version in FOCS 1995
-
(1999)
J. Comput. Syst. Sci.
, vol.58
, Issue.2
, pp. 336-375
-
-
Naor, M.1
Reingold, O.2
-
29
-
-
4243054954
-
Number-theoretic constructions of efficient pseudorandom functions
-
Preliminary version in FOCS 1997
-
Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudorandom functions. J. ACM 51(2), 231-262 (2004); Preliminary version in FOCS 1997
-
(2004)
J. ACM
, vol.51
, Issue.2
, pp. 231-262
-
-
Naor, M.1
Reingold, O.2
-
30
-
-
0036588802
-
Pseudorandom functions and factoring
-
Preliminary version in STOC 2000
-
Naor, M., Reingold, O., Rosen, A.: Pseudorandom functions and factoring. SIAM J. Comput. 31(5), 1383-1404 (2002); Preliminary version in STOC 2000
-
(2002)
SIAM J. Comput.
, vol.31
, Issue.5
, pp. 1383-1404
-
-
Naor, M.1
Reingold, O.2
Rosen, A.3
-
31
-
-
70350642078
-
Public-key cryptosystems from the worst-case shortest vector problem
-
Peikert, C.: Public-key cryptosystems from the worst-case shortest vector problem. In: STOC, pp. 333-342 (2009)
-
(2009)
STOC
, pp. 333-342
-
-
Peikert, C.1
-
32
-
-
77956996919
-
An efficient and parallel gaussian sampler for lattices
-
Rabin, T. (ed.) CRYPTO 2010 Springer, Heidelberg
-
Peikert, C.: An Efficient and Parallel Gaussian Sampler for Lattices. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 80-97. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 80-97
-
-
Peikert, C.1
-
33
-
-
51849152661
-
Lossy trapdoor functions and their applications
-
Peikert, C.,Waters, B.: Lossy trapdoor functions and their applications. In: STOC, pp. 187-196 (2008)
-
(2008)
STOC
, pp. 187-196
-
-
Peikert, C.1
Waters, B.2
-
34
-
-
84889754057
-
-
Last retrieved from June 28, 2011
-
Pietrzak, K.: Subspace LWE (2010) (manuscript), http://homepages.cwi.nl/ ∼pietrzak/publications/SLWE.pdf (Last retrieved from June 28, 2011)
-
Subspace LWE (2010) (Manuscript)
-
-
Pietrzak, K.1
-
35
-
-
70349309809
-
On lattices learning with errors random linear codes, and cryptography
-
Preliminary version in STOC 2005
-
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM 56(6), 1-40 (2009); Preliminary version in STOC 2005
-
(2009)
J. ACM
, vol.56
, Issue.6
, pp. 1-40
-
-
Regev, O.1
-
36
-
-
0026932814
-
On threshold circuits and polynomial computation
-
Reif, J.H., Tate, S.R.: On threshold circuits and polynomial computation. SIAM J. Comput. 21(5), 896-908 (1992)
-
(1992)
SIAM J. Comput.
, vol.21
, Issue.5
, pp. 896-908
-
-
Reif, J.H.1
Tate, S.R.2
-
37
-
-
0023532388
-
A hierarchy of polynomial time lattice basis reduction algorithms
-
Schnorr, C.-P.: A hierarchy of polynomial time lattice basis reduction algorithms. Theor. Comput. Sci. 53, 201-224 (1987)
-
(1987)
Theor. Comput. Sci.
, vol.53
, pp. 201-224
-
-
Schnorr, C.-P.1
-
38
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
-
van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully Homomorphic Encryption over the Integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24-43. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 24-43
-
-
Van Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
|