-
1
-
-
77954625601
-
Efficient lattice (H)IBE in the standard model
-
Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
-
Agrawal, S., Boneh, D., Boyen, X.: Efficient Lattice (H)IBE in the Standard Model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 553-572. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 553-572
-
-
Agrawal, S.1
Boneh, D.2
Boyen, X.3
-
2
-
-
77957015647
-
Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE
-
Rabin, T. (ed.) CRYPTO 2010 Springer, Heidelberg
-
Agrawal, S., Boneh, D., Boyen, X.: Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 98-115. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 98-115
-
-
Agrawal, S.1
Boneh, D.2
Boyen, X.3
-
3
-
-
84887467921
-
Generating hard instances of the short basis problem
-
Wiedermann, J., Van Emde Boas, P., Nielsen, M. (eds.) ICALP 1999 Springer, Heidelberg
-
Ajtai, M.: Generating Hard Instances of the Short Basis Problem. In: Wiedermann, J., Van Emde Boas, P., Nielsen, M. (eds.) ICALP 1999. LNCS, vol. 1644, pp. 1-9. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1644
, pp. 1-9
-
-
Ajtai, M.1
-
4
-
-
38749147177
-
Generating hard instances of lattice problems
-
Preliminary version in STOC 1996
-
Ajtai, M.: Generating hard instances of lattice problems. Quaderni di Matematica 13, 1-32 (1996); Preliminary version in STOC 1996
-
(1996)
Quaderni di Matematica
, vol.13
, pp. 1-32
-
-
Ajtai, M.1
-
5
-
-
79751533106
-
Generating shorter bases for hard random lattices
-
Preliminary version in STACS
-
Alwen, J., Peikert, C.: Generating shorter bases for hard random lattices. Theory of Computing Systems 48(3), 535-553 (2011); Preliminary version in STACS 2009
-
(2011)
Theory of Computing Systems
, vol.48
, Issue.3
, pp. 535-553
-
-
Alwen, J.1
Peikert, C.2
-
6
-
-
70350342511
-
Fast cryptographic primitives and circular-secure encryption based on hard learning problems
-
Halevi, S. (ed.) CRYPTO 2009 Springer, Heidelberg
-
Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 595-618. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 595-618
-
-
Applebaum, B.1
Cash, D.2
Peikert, C.3
Sahai, A.4
-
7
-
-
51249173801
-
On Lov́asz' lattice reduction and the nearest lattice point problem
-
Preliminary version in STACS 1985
-
Babai, L.: On Lov́asz' lattice reduction and the nearest lattice point problem. Combinatorica 6(1), 1-13 (1986); Preliminary version in STACS 1985
-
(1986)
Combinatorica
, vol.6
, Issue.1
, pp. 1-13
-
-
Babai, L.1
-
8
-
-
84877639283
-
Cryptographic primitives based on hard learning problems
-
Stinson, D.R. (ed.) CRYPTO 1993 Springer, Heidelberg
-
Blum, A., Furst, M.L., Kearns, M., Lipton, R.J.: Cryptographic Primitives Based on Hard Learning Problems. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 278-291. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 278-291
-
-
Blum, A.1
Furst, M.L.2
Kearns, M.3
Lipton, R.J.4
-
9
-
-
79955534142
-
Lattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more
-
Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010 Springer, Heidelberg
-
Boyen, X.: Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 499-517. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6056
, pp. 499-517
-
-
Boyen, X.1
-
10
-
-
84857756269
-
Fully homomorphic encryption without bootstrapping
-
Brakerski, Z., Gentry, C., Vaikuntanathan, V.: Fully homomorphic encryption without bootstrapping. Cryptology ePrint Archive, Report 2011/277 (2011), http://eprint.iacr.org/
-
(2011)
Cryptology EPrint Archive, Report 2011/277
-
-
Brakerski, Z.1
Gentry, C.2
Vaikuntanathan, V.3
-
11
-
-
80955132201
-
Efficient fully homomorphic encryption from (standard) LWE
-
Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. In: FOCS (2011)
-
(2011)
FOCS
-
-
Brakerski, Z.1
Vaikuntanathan, V.2
-
12
-
-
80051986706
-
Fully homomorphic encryption from ring-lwe and security for key dependent messages
-
Rogaway, P. (ed.) CRYPTO 2011 Springer, Heidelberg
-
Brakerski, Z., Vaikuntanathan, V.: Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 505-524. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6841
, pp. 505-524
-
-
Brakerski, Z.1
Vaikuntanathan, V.2
-
13
-
-
77954654490
-
Bonsai trees, or how to delegate a lattice basis
-
Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
-
Cash, D., Hofheinz, D., Kiltz, E., Peikert, C.: Bonsai Trees, or How to Delegate a Lattice Basis. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 523-552. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 523-552
-
-
Cash, D.1
Hofheinz, D.2
Kiltz, E.3
Peikert, C.4
-
14
-
-
82955184568
-
BKZ 2.0: Better lattice security estimates
-
Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011 Springer, Heidelberg
-
Chen, Y., Nguyen, P.Q.: BKZ 2.0: Better Lattice Security Estimates. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 1-20. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7073
, pp. 1-20
-
-
Chen, Y.1
Nguyen, P.Q.2
-
15
-
-
44449128937
-
Predicting lattice reduction
-
Smart, N.P. (ed.) EUROCRYPT 2008 Springer, Heidelberg
-
Gama, N., Nguyen, P.Q.: Predicting Lattice Reduction. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 31-51. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 31-51
-
-
Gama, N.1
Nguyen, P.Q.2
-
17
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC, pp. 169-178 (2009)
-
(2009)
STOC
, pp. 169-178
-
-
Gentry, C.1
-
18
-
-
84863325315
-
Fully homomorphic encryption without squashing using depth-3 arithmetic circuits
-
Gentry, C., Halevi, S.: Fully homomorphic encryption without squashing using depth-3 arithmetic circuits. In: FOCS (2011)
-
(2011)
FOCS
-
-
Gentry, C.1
Halevi, S.2
-
19
-
-
77954628604
-
A simple BGN-Type cryptosystem from LWE
-
Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
-
Gentry, C., Halevi, S., Vaikuntanathan, V.: A Simple BGN-Type Cryptosystem from LWE. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 506-522. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 506-522
-
-
Gentry, C.1
Halevi, S.2
Vaikuntanathan, V.3
-
20
-
-
51849137205
-
Trapdoors for hard lattices and new cryptographic constructions
-
Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: STOC, pp. 197-206 (2008)
-
(2008)
STOC
, pp. 197-206
-
-
Gentry, C.1
Peikert, C.2
Vaikuntanathan, V.3
-
21
-
-
84958655849
-
Public-Key cryptosystems from lattice reduction problems
-
Kaliski Jr., B.S. (ed.) CRYPTO 1997 Springer, Heidelberg
-
Goldreich, O., Goldwasser, S., Halevi, S.: Public-Key Cryptosystems from Lattice Reduction Problems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 112-131. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 112-131
-
-
Goldreich, O.1
Goldwasser, S.2
Halevi, S.3
-
22
-
-
78650842020
-
A group signature scheme from lattice assumptions
-
Abe, M. (ed.) ASIACRYPT 2010 Springer, Heidelberg
-
Gordon, S.D., Katz, J., Vaikuntanathan, V.: A Group Signature Scheme from Lattice Assumptions. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 395-412. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6477
, pp. 395-412
-
-
Gordon, S.D.1
Katz, J.2
Vaikuntanathan, V.3
-
23
-
-
77954646659
-
Adaptive trapdoor functions and chosen-ciphertext security
-
Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
-
Kiltz, E., Mohassel, P., O'Neill, A.: Adaptive Trapdoor Functions and Chosen-Ciphertext Security. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 673-692. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 673-692
-
-
Kiltz, E.1
Mohassel, P.2
O'Neill, A.3
-
24
-
-
0033896372
-
Finding the closest lattice vector when it's unusually close
-
Klein, P.N.: Finding the closest lattice vector when it's unusually close. In: SODA, pp. 937-941 (2000)
-
(2000)
SODA
, pp. 937-941
-
-
Klein, P.N.1
-
25
-
-
79951793525
-
Better key sizes (and Attacks) for LWE-Based encryption
-
Kiayias, A. (ed.) CT-RSA 2011 Springer, Heidelberg
-
Lindner, R., Peikert, C.: Better Key Sizes (and Attacks) for LWE-Based Encryption. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 319-339. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6558
, pp. 319-339
-
-
Lindner, R.1
Peikert, C.2
-
26
-
-
40249086645
-
Lattice-based identification schemes secure under active attacks
-
Cramer, R. (ed.) PKC 2008 Springer, Heidelberg
-
Lyubashevsky, V.: Lattice-Based Identification Schemes Secure Under Active Attacks. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 162-179. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4939
, pp. 162-179
-
-
Lyubashevsky, V.1
-
27
-
-
84859986507
-
Lattice signatures without trapdoors
-
Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012 Springer, Heidelberg
-
Lyubashevsky, V.: Lattice Signatures without Trapdoors. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 738-755. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7237
, pp. 738-755
-
-
Lyubashevsky, V.1
-
28
-
-
33746342484
-
Generalized compact knapsacks are collision resistant
-
Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II Springer, Heidelberg
-
Lyubashevsky, V., Micciancio, D.: Generalized Compact Knapsacks Are Collision Resistant. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. LNCS, vol. 4052, pp. 144-155. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 144-155
-
-
Lyubashevsky, V.1
Micciancio, D.2
-
29
-
-
40249114814
-
Asymptotically efficient lattice-based digital signatures
-
Canetti, R. (ed.) TCC 2008 Springer, Heidelberg
-
Lyubashevsky, V., Micciancio, D.: Asymptotically Efficient Lattice-Based Digital Signatures. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 37-54. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 37-54
-
-
Lyubashevsky, V.1
Micciancio, D.2
-
30
-
-
50249148926
-
SWIFFT: A modest proposal for FFT hashing
-
Nyberg, K. (ed.) FSE 2008 Springer, Heidelberg
-
Lyubashevsky, V., Micciancio, D., Peikert, C., Rosen, A.: SWIFFT: A Modest Proposal for FFT Hashing. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 54-72. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5086
, pp. 54-72
-
-
Lyubashevsky, V.1
Micciancio, D.2
Peikert, C.3
Rosen, A.4
-
31
-
-
77954639468
-
On ideal lattices and learning with errors over rings
-
Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
-
Lyubashevsky, V., Peikert, C., Regev, O.: On Ideal Lattices and Learning with Errors over Rings. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 1-23. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 1-23
-
-
Lyubashevsky, V.1
Peikert, C.2
Regev, O.3
-
32
-
-
38749089099
-
Generalized compact knapsacks, cyclic lattices, and efficient oneway functions
-
Preliminary version in FOCS 2002
-
Micciancio, D.: Generalized compact knapsacks, cyclic lattices, and efficient oneway functions. Computational Complexity 16(4), 365-411 (2007); Preliminary version in FOCS 2002
-
(2007)
Computational Complexity
, vol.16
, Issue.4
, pp. 365-411
-
-
Micciancio, D.1
-
33
-
-
80051960879
-
Pseudorandom knapsacks and the sample complexity of LWE Search-to-decision reductions
-
Rogaway, P. (ed.) CRYPTO 2011 Springer, Heidelberg
-
Micciancio, D., Mol, P.: Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 465-484. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6841
, pp. 465-484
-
-
Micciancio, D.1
Mol, P.2
-
34
-
-
70350294927
-
Lattice-based cryptography
-
Springer, Heidelberg
-
Micciancio, D., Regev, O.: Lattice-based cryptography. In: Post Quantum Cryptography, pp. 147-191. Springer, Heidelberg (2009)
-
(2009)
Post Quantum Cryptography
, pp. 147-191
-
-
Micciancio, D.1
Regev, O.2
-
35
-
-
70350642078
-
Public-key cryptosystems from the worst-case shortest vector problem
-
Peikert, C.: Public-key cryptosystems from the worst-case shortest vector problem. In: STOC, pp. 333-342 (2009)
-
(2009)
STOC
, pp. 333-342
-
-
Peikert, C.1
-
36
-
-
77956996919
-
An efficient and parallel gaussian sampler for lattices
-
Rabin, T. (ed.) CRYPTO 2010 Springer, Heidelberg
-
Peikert, C.: An Efficient and Parallel Gaussian Sampler for Lattices. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 80-97. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 80-97
-
-
Peikert, C.1
-
37
-
-
33745559478
-
Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices
-
Halevi, S., Rabin, T. (eds.) TCC 2006 Springer, Heidelberg
-
Peikert, C., Rosen, A.: Efficient Collision-Resistant Hashing from Worst-Case Assumptions on Cyclic Lattices. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 145-166. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3876
, pp. 145-166
-
-
Peikert, C.1
Rosen, A.2
-
38
-
-
51849098944
-
Noninteractive statistical zero-knowledge proofs for lattice problems
-
Wagner, D. (ed.) CRYPTO 2008 Springer, Heidelberg
-
Peikert, C., Vaikuntanathan, V.: Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 536-553. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 536-553
-
-
Peikert, C.1
Vaikuntanathan, V.2
-
39
-
-
51849126892
-
A framework for efficient and composable oblivious transfer
-
Wagner, D. (ed.) CRYPTO 2008 Springer, Heidelberg
-
Peikert, C., Vaikuntanathan, V., Waters, B.: A Framework for Efficient and Composable Oblivious Transfer. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 554-571. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 554-571
-
-
Peikert, C.1
Vaikuntanathan, V.2
Waters, B.3
-
40
-
-
51849152661
-
Lossy trapdoor functions and their applications
-
Peikert, C.,Waters, B.: Lossy trapdoor functions and their applications. In: STOC, pp. 187-196 (2008)
-
(2008)
STOC
, pp. 187-196
-
-
Peikert, C.1
Waters, B.2
-
41
-
-
70349309809
-
On lattices learning with errors random linear codes, and cryptography
-
Preliminary version in STOC 2005
-
Regev,O.:On lattices, learning with errors, random linear codes, and cryptography. J. ACM 56(6), 1-40 (2005); Preliminary version in STOC 2005
-
(2005)
J. ACM
, vol.56
, Issue.6
, pp. 1-40
-
-
Regev, O.1
-
42
-
-
77954421317
-
Strongly unforgeable signatures and hierarchical identity-based signatures from lattices without random oracles
-
Sendrier, N. (ed.) PQCrypto 2010 Springer, Heidelberg
-
R̈uckert, M.: Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles. In: Sendrier, N. (ed.) PQCrypto 2010. LNCS, vol. 6061, pp. 182-200. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6061
, pp. 182-200
-
-
R̈uckert, M.1
-
44
-
-
72449142727
-
Efficient public key encryption based on ideal lattices
-
Matsui, M. (ed.) ASIACRYPT 2009 Springer, Heidelberg
-
Stehĺe, D., Steinfeld, R., Tanaka, K., Xagawa, K.: Efficient Public Key Encryption Based on Ideal Lattices. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 617-635. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 617-635
-
-
Stehĺe, D.1
Steinfeld, R.2
Tanaka, K.3
Xagawa, K.4
-
45
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
-
van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully Homomorphic Encryption over the Integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24-43. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 24-43
-
-
Van Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
|