-
2
-
-
0029719917
-
Generating hard instances of lattice problems (extended abstract)
-
ACM Press New York
-
M. Ajtai, Generating hard instances of lattice problems (extended abstract), in: Theory of Computing (STOC 1996), ACM Press, New York (1996), 99-108.
-
(1996)
Theory of Computing (STOC 1996)
, pp. 99-108
-
-
Ajtai, M.1
-
3
-
-
84943794689
-
-
M. Albrecht, BKW-LWE, 2013, https://bitbucket.org/malb/bkw-lwe.
-
(2013)
BKW-LWE
-
-
Albrecht, M.1
-
5
-
-
84943774352
-
-
M. Albrecht, D. Cadé, X. Pujol and D. Stehlé, fplll, development version, 2014, https://github.com/dstehle/fplll.
-
(2014)
Development Version
-
-
Albrecht, M.1
Cadé, D.2
Pujol, X.3
Stehléfplll, D.4
-
6
-
-
84921999799
-
On the complexity of the BKW algorithm on LWE des
-
M. R. Albrecht, C. Cid, J.-C. Faugère, R. Fitzpatrick and L. Perret, On the complexity of the BKW algorithm on LWE, Des. Codes Cryptogr. 74 (2015), 325-354.
-
(2015)
Codes Cryptogr
, vol.74
, pp. 325-354
-
-
Albrecht, M.R.1
Cid, C.2
Faugère, J.-C.3
Fitzpatrick, R.4
Perret, L.5
-
8
-
-
84958549912
-
Lazy modulus switching for the BKW algorithm on LWE
-
Springer, Berlin
-
M. R. Albrecht, J.-C. Faugère, R. Fitzpatrick and L. Perret, Lazy modulus switching for the BKW algorithm on LWE, in: Public-Key Cryptography (PKC 2014) Lecture Notes in Comput. Sci. 8383, Springer, Berlin (2014), 429-445.
-
(2014)
Public-Key Cryptography (PKC 2014) Lecture Notes in Comput. Sci
, vol.8383
, pp. 429-445
-
-
Albrecht, M.R.1
Faugère, J.-C.2
Fitzpatrick, R.3
Perret, L.4
-
9
-
-
84899088927
-
-
preprint
-
M. R. Albrecht, R. Fitzpatrick, D. Cabracas, F. Göpfert and M. Schneider, A generator for LWE and Ring-LWE instances, preprint (2013), www.iacr.org/news/-les/2013-04-29lwe-generator.pdf.
-
(2013)
A Generator for LWE and Ring-LWE Instances
-
-
Albrecht, M.R.1
Fitzpatrick, R.2
Cabracas, D.3
Göpfert, F.4
Schneider, M.5
-
10
-
-
84911206615
-
On the ecacy of solving LWE by reduction to unique-SVP
-
Springer, Cham
-
M. R. Albrecht, R. Fitzpatrick and F. Göpfert, On the e-cacy of solving LWE by reduction to unique-SVP, in: Information Security and Cryptology (ICISC 13), Lecture Notes in Comput. Sci. 8565, Springer, Cham (2014), 293-310.
-
(2014)
Information Security and Cryptology (ICISC 13) Lecture Notes in Comput. Sci
, vol.8565
, pp. 293-310
-
-
Albrecht, M.R.1
Fitzpatrick, R.2
Göpfert, F.3
-
11
-
-
84943794787
-
-
B. Applebaum, D. Cash, C. Peikert and A. Sahai, Fast cryptographic primitives and circular-secure encryption based on hard learning problems, in: [40], 595-618.
-
Fast Cryptographic Primitives and Circular-secure Encryption Based on Hard Learning Problems
, vol.40
, pp. 595-618
-
-
Applebaum, B.1
Cash, D.2
Peikert, C.3
Sahai, A.4
-
12
-
-
79960014155
-
New algorithms for learning in presence of errors in
-
Springer, Berlin
-
S. Arora and R. Ge, New algorithms for learning in presence of errors, in: Automata, Languages and Programming (ICALP 2011), part I, Lecture Notes in Comput. Sci. 6755, Springer, Berlin (2011), 403-415.
-
(2011)
Automata, Languages and Programming (ICALP 2011), Part I, Lecture Notes in Comput Sci
, vol.6755
, pp. 403-415
-
-
Arora, S.1
Ge, R.2
-
13
-
-
85035362365
-
On Lovász' lattice reduction and the nearest lattice point problem (shortened version)
-
Springer Berlin
-
L. Babai, On Lovász' lattice reduction and the nearest lattice point problem (shortened version), in: Theoretical Aspects of Computer Science (STACS 1986), Lecture Notes in Comput. Sci 182, Springer, Berlin (1985), 13-20.
-
(1985)
Theoretical Aspects of Computer Science (STACS 1986), Lecture Notes in Comput. Sci
, vol.182
, pp. 13-20
-
-
Babai, L.1
-
14
-
-
84904191573
-
Lattice decoding attacks on binary LWE in
-
Springer, Berlin
-
S. Bai and S. D. Galbraith, Lattice decoding attacks on binary LWE, in: Information Security and Privacy (ACISP 2014), Lecture Notes in Comput. Sci. 8544, Springer, Berlin (2014), 322-337.
-
(2014)
Information Security and Privacy (ACISP 2014), Lecture Notes in Comput Sci
, vol.8544
, pp. 322-337
-
-
Bai, S.1
Galbraith, S.D.2
-
16
-
-
24144453496
-
Noise-tolerant learning the parity problem, and the statistical query model
-
A. Blum, A. Kalai and H. Wasserman, Noise-tolerant learning, the parity problem, and the statistical query model, J. ACM 50 (2003), no. 4, 506-519.
-
(2003)
J. ACM
, vol.50
, Issue.4
, pp. 506-519
-
-
Blum, A.1
Kalai, A.2
Wasserman, H.3
-
17
-
-
84856466374
-
Leveled fully homomorphic encryption without bootstrapping
-
ACM Press New York
-
Z. Brakerski, C. Gentry and V. Vaikuntanathan, (Leveled) fully homomorphic encryption without bootstrapping, in: Innovations in Theoretical Computer Science (ITCS 2012), ACM Press, New York (2012), 309-325.
-
(2012)
Innovations in Theoretical Computer Science (ITCS 2012)
, pp. 309-325
-
-
Brakerski, Z.1
Gentry, C.2
Vaikuntanathan, V.3
-
18
-
-
84879829096
-
Classical hardness of learning with errors
-
ACM Press New York
-
Z. Brakerski, A. Langlois, C. Peikert, O. Regev and D. Stehlé, Classical hardness of learning with errors, in: Theory of Computing (STOC 2013), ACM Press, New York (2013), 575-584.
-
(2013)
Theory of Computing (STOC 2013)
, pp. 575-584
-
-
Brakerski, Z.1
Langlois, A.2
Peikert, C.3
Regev, O.4
Stehlé, D.5
-
19
-
-
80955132201
-
Ecient fully homomorphic encryption from (standard) LWE
-
IEEE Computer Society Press Los Alamitos
-
Z. Brakerski and V. Vaikuntanathan, E-cient fully homomorphic encryption from (standard) LWE, in: Foundations of Computer Science (FOCS 2011), IEEE Computer Society Press, Los Alamitos (2011), 97-106.
-
(2011)
Foundations of Computer Science (FOCS 2011)
, pp. 97-106
-
-
Brakerski, Z.1
Vaikuntanathan, V.2
-
20
-
-
58849088964
-
-
Springer, Berlin
-
P. Bürgisser, M. Clausen and M. A. Shokrollahi, Algebraic Complexity Theory, Grundlehren Math. Wiss. 315, Springer, Berlin, 1997.
-
(1997)
Algebraic Complexity Theory, Grundlehren Math Wiss
, vol.315
-
-
Bürgisser, P.1
Clausen, M.2
Shokrollahi, M.A.3
-
22
-
-
84869493875
-
Bonsai trees or how to delegate a lattice basis
-
D. Cash, D. Ho-einz, E. Kiltz and C. Peikert, Bonsai trees, or how to delegate a lattice basis, J. Cryptology 25 (2012), no. 4, 601-639.
-
(2012)
J. Cryptology
, vol.25
, Issue.4
, pp. 601-639
-
-
Cash, D.1
Hoeinz, D.2
Kiltz, E.3
Peikert, C.4
-
24
-
-
82955184568
-
BKZ 2.0: Better lattice security estimates in
-
Springer, Berlin
-
Y. Chen and P. Q. Nguyen, BKZ 2.0: Better lattice security estimates, in: Advances in Cryptology (Asiacrypt 2011), Lecture Notes in Comput. Sci. 7073, Springer, Berlin (2011), 1-20.
-
(2011)
Advances in Cryptology (Asiacrypt 2011), Lecture Notes in Comput Sci
, vol.7073
, pp. 1-20
-
-
Chen, Y.1
Nguyen, P.Q.2
-
26
-
-
0000182415
-
A measure of asymptotic e-ciency for tests of a hypothesis based on the sum of observations
-
H. Cherno-, A measure of asymptotic e-ciency for tests of a hypothesis based on the sum of observations, Ann. Math. Stat. 23 (1952), 493-507.
-
(1952)
Ann Math. Stat
, vol.23
, pp. 493-507
-
-
Cherno, H.1
-
29
-
-
44449128937
-
Predicting lattice reduction in
-
Springer, Berlin
-
N. Gama and P. Q. Nguyen, Predicting lattice reduction, in: Advances in Cryptology (Eurocrypt 2008), Lecture Notes in Comput. Sci. 4965, Springer, Berlin (2008), 31-51.
-
(2008)
Advances in Cryptology (Eurocrypt 2008), Lecture Notes in Comput Sci
, vol.4965
, pp. 31-51
-
-
Gama, N.1
Nguyen, P.Q.2
-
31
-
-
84879875394
-
Candidate multilinear maps from ideal lattices
-
Springer, Berlin
-
S. Garg, C. Gentry and S. Halevi, Candidate multilinear maps from ideal lattices, in: Advances in Cryptology (Eurocrypt 2013), Lecture Notes in Comput. Sci. 7881, Springer, Berlin (2013), 1-17.
-
(2013)
Advances in Cryptology (Eurocrypt 2013) Lecture Notes in Comput. Sci
, vol.7881
, pp. 1-17
-
-
Garg, S.1
Gentry, C.2
Halevi, S.3
-
34
-
-
84859991531
-
Fully homomorphic encryption with polylog overhead in
-
Springer, Berlin
-
C. Gentry, S. Halevi and N. P. Smart, Fully homomorphic encryption with polylog overhead, in: Advances in Cryptology (Eurocrypt 2012), Lecture Notes in Comput. Sci. 7237, Springer, Berlin (2012), 465-482.
-
(2012)
Advances in Cryptology (Eurocrypt 2012), Lecture Notes in Comput Sci
, vol.7237
, pp. 465-482
-
-
Gentry, C.1
Halevi, S.2
Smart, N.P.3
-
35
-
-
84865518868
-
Homomorphic evaluation of the AES circuit in
-
Springer, Berlin
-
C. Gentry, S. Halevi and N. P. Smart, Homomorphic evaluation of the AES circuit, in: Advances in Cryptology (Crypto 2012), Lecture Notes in Comput. Sci. 7417, Springer, Berlin (2012), 850-867.
-
(2012)
Advances in Cryptology (Crypto 2012), Lecture Notes in Comput Sci
, vol.7417
, pp. 850-867
-
-
Gentry, C.1
Halevi, S.2
Smart, N.P.3
-
37
-
-
51849137205
-
Trapdoors for hard lattices and new cryptographic constructions
-
ACM Press New York
-
C. Gentry, C. Peikert and V. Vaikuntanathan, Trapdoors for hard lattices and new cryptographic constructions, in: Theory of Computing (STOC 2008), ACM Press, New York (2008), 197-206.
-
(2008)
Theory of Computing (STOC 2008)
, pp. 197-206
-
-
Gentry, C.1
Peikert, C.2
Vaikuntanathan, V.3
-
39
-
-
77955260391
-
Robustness of the learning with errors assumption
-
Tsinghua University Press Beijing
-
S. Goldwasser, Y. Kalai, C. Peikert and V. Vaikuntanathan, Robustness of the learning with errors assumption, in: Innovations in Computer Science (ICS 2010), Tsinghua University Press, Beijing (2010), 230-240.
-
(2010)
Innovations in Computer Science (ICS 2010)
, pp. 230-240
-
-
Goldwasser, S.1
Kalai, Y.2
Peikert, C.3
Vaikuntanathan, V.4
-
40
-
-
84943739653
-
-
Springer, Berlin
-
S. Halevi (ed.), Advances in Cryptology (Crypto 2009), Lecture Notes in Comput. Sci. 5677, Springer, Berlin, 2009.
-
Advances in Cryptology (Crypto 2009), Lecture Notes in Comput. Sci
, vol.5677
, pp. 2009
-
-
Halevi, S.1
-
41
-
-
79959285632
-
Algorithms for the shortest and closest lattice vector problems
-
Springer, Berlin
-
G. Hanrot, X. Pujol and D. Stehlé, Algorithms for the shortest and closest lattice vector problems, in: Coding and Cryptology, Lecture Notes in Comput. Sci. 6639, Springer, Berlin (2011), 159-190.
-
(2011)
Coding and Cryptology, Lecture Notes in Comput Sci
, vol.6639
, pp. 159-190
-
-
Hanrot, G.1
Pujol, X.2
Stehlé, D.3
-
42
-
-
80051992791
-
Analyzing blockwise lattice algorithms using dynamical systems
-
Springer, Berlin
-
G. Hanrot, X. Pujol and D. Stehlé, Analyzing blockwise lattice algorithms using dynamical systems, in: Advances in Cryptology (Crypto 2011), Lecture Notes in Comput. Sci. 6841, Springer, Berlin (2011), 447-464.
-
(2011)
Advances in Cryptology (Crypto 2011) Lecture Notes in Comput. Sci
, vol.6841
, pp. 447-464
-
-
Hanrot, G.1
Pujol, X.2
Stehlé, D.3
-
46
-
-
0000126406
-
Minkowski's convex body theorem and integer programming
-
R. Kannan, Minkowski's convex body theorem and integer programming, Math. Oper. Res. 12 (1987), no. 3, 415-440.
-
(1987)
Math. Oper. Res
, vol.12
, Issue.3
, pp. 415-440
-
-
Kannan, R.1
-
47
-
-
0028098408
-
On the learnability of discrete distributions
-
ACM Press New York
-
M. J. Kearns, Y. Mansour, D. Ron, R. Rubinfeld, R. E. Schapire and L. Sellie, On the learnability of discrete distributions, in: Theory of Computing (STOC 1994), ACM Press, New York (1994), 273-282.
-
(1994)
Theory of Computing (STOC 1994)
, pp. 273-282
-
-
Kearns, M.J.1
Mansour, Y.2
Ron, D.3
Rubinfeld, R.4
Schapire, R.E.5
Sellie, L.6
-
50
-
-
34250244723
-
Factoring polynomials with rational coecients
-
A. Lenstra, J. Lenstra, H.W. and L. Lovász, Factoring polynomials with rational coe-cients, Math. Ann. 261 (1982), no. 4, 515-534.
-
(1982)
Math. Ann
, vol.261
, Issue.4
, pp. 515-534
-
-
Lenstra, A.1
Lenstra H W, J.2
Lovász, L.3
-
51
-
-
84902687727
-
A comparison of the homomorphic encryption schemes FV and YASHE
-
Springer, Berlin
-
T. Lepoint and M. Naehrig, A comparison of the homomorphic encryption schemes FV and YASHE, in: Progress in Cryptology (Africacrypt 2014), Lecture Notes in Comput. Sci. 8469, Springer, Berlin (2014), 318-335.
-
(2014)
Progress in Cryptology (Africacrypt 2014) Lecture Notes in Comput. Sci
, vol.8469
, pp. 318-335
-
-
Lepoint, T.1
Naehrig, M.2
-
52
-
-
79951793525
-
Better key sizes (and attacks) for LWE-based encryption
-
Springer, Berlin
-
R. Lindner and C. Peikert, Better key sizes (and attacks) for LWE-based encryption, in: Topics in Cryptology (CT-RSA 2011), Lecture Notes in Comput. Sci. 6558, Springer, Berlin (2011), 319-339.
-
(2011)
Topics in Cryptology (CT-RSA 2011) Lecture Notes in Comput. Sci
, vol.6558
, pp. 319-339
-
-
Lindner, R.1
Peikert, C.2
-
53
-
-
80054823583
-
Decoding by embedding: Correct decoding radius and DMT optimality
-
IEEE Computer Society, Los Alamitos
-
C. Ling, S. Liu, L. Luzzi and D. Stehlé, Decoding by embedding: Correct decoding radius and DMT optimality, in: Information Theory Proceedings (ISIT 2011), IEEE Computer Society, Los Alamitos (2011), 1106-1110.
-
(2011)
Information Theory Proceedings (ISIT 2011)
, pp. 1106-1110
-
-
Ling, C.1
Liu, S.2
Luzzi, L.3
Stehlé, D.4
-
54
-
-
84874342837
-
Solving BDD by enumeration: An update in
-
Springer, Berlin
-
M. Liu and P. Q. Nguyen, Solving BDD by enumeration: An update, in: Topics in Cryptology (CT-RSA 2013), Lecture Notes in Comput. Sci. 7779, Springer, Berlin (2013), 293-309.
-
(2013)
Topics in Cryptology (CT-RSA 2013), Lecture Notes in Comput Sci
, vol.7779
, pp. 293-309
-
-
Liu, M.1
Nguyen, P.Q.2
-
55
-
-
84943785203
-
An algorithmic theory of numbers, graphs and convexity, CBMS-NSF regional conf ser
-
SIAM, Philadelphia
-
L. Lovász, An Algorithmic Theory of Numbers, Graphs and Convexity, CBMS-NSF Regional Conf. Ser. in Appl. Math., SIAM, Philadelphia, 1986.
-
(1986)
Appl. Math.
-
-
Lovász, L.1
-
56
-
-
84943760010
-
-
V. Lyubashevsky and D. Micciancio, On bounded distance decoding, unique shortest vectors, and the minimum distance problem, in: [40], 577-594.
-
On Bounded Distance Decoding Unique Shortest Vectors, and the Minimum Distance Problem
, vol.40
, pp. 577-594
-
-
Lyubashevsky, V.1
Micciancio, D.2
-
57
-
-
84884472921
-
Hardness of SIS and LWE with small parameters in
-
Springer, Berlin
-
D. Micciancio and C. Peikert, Hardness of SIS and LWE with small parameters, in: Advances in Cryptology (Crypto 2013), part I, Lecture Notes in Comput. Sci. 8042, Springer, Berlin (2013), 21-39.
-
(2013)
Advances in Cryptology (Crypto 2013), Part I, Lecture Notes in Comput Sci
, vol.8042
, pp. 21-39
-
-
Micciancio, D.1
Peikert, C.2
-
60
-
-
0004152689
-
-
Argonne National Laboratory
-
J. J. Moré, B. S. Garbow and K. E. Hillstrom, User guide for MINPACK-1, ANL-80-74, Argonne National Laboratory, 1980, www.mcs.anl.gov/~more/ANL8074a.pdf.
-
(1980)
User Guide for MINPACK-1, ANL-80-74
-
-
Moré, J.J.1
Garbow, B.S.2
Hillstrom, K.E.3
-
62
-
-
79957981027
-
Lattice reduction algorithms: Theory and practice (invited talk)
-
Springer, Berlin
-
P. Q. Nguyen, Lattice reduction algorithms: Theory and practice (invited talk), in: Advances in Cryptology (Eurocrypt 2011), Lecture Notes in Comput. Sci. 6632, Springer, Berlin (2011), 2-6.
-
(2011)
Advances in Cryptology (Eurocrypt 2011), Lecture Notes in Comput Sci
, vol.6632
, pp. 2-6
-
-
Nguyen, P.Q.1
-
63
-
-
24944584767
-
Floating-point LLL revisited
-
Springer, Berlin
-
P. Q. Nguyen and D. Stehlé, Floating-point LLL revisited, in: Advances in Cryptology (Eurocrypt 2005), Lecture Notes in Comput. Sci. 3494, Springer, Berlin (2005), 215-233.
-
(2005)
Advances in Cryptology (Eurocrypt 2005) Lecture Notes in Comput. Sci
, vol.3494
, pp. 215-233
-
-
Nguyen, P.Q.1
Stehlé, D.2
-
64
-
-
79955447635
-
The LLL algorithm: Survey and applications, inf
-
Springer, Dordrecht
-
P. Q. Nguyen and B. Valleé (eds.), The LLL Algorithm: Survey and Applications, Inf. Secur. Cryptography, Springer, Dordrecht, 2010.
-
(2010)
Secur. Cryptography
-
-
Nguyen, P.Q.1
Valleé, B.2
-
65
-
-
70350642078
-
Public-key cryptosystems from the worst-case shortest vector problem: Extended abstract
-
ACM Press New York
-
C. Peikert, Public-key cryptosystems from the worst-case shortest vector problem: Extended abstract, in: Theory of Computing (STOC 2009), ACM Press, New York (2009), 333-342.
-
(2009)
Theory of Computing (STOC 2009)
, pp. 333-342
-
-
Peikert, C.1
-
66
-
-
51849126892
-
A framework for ecient and composable oblivious transfer
-
Springer, Berlin
-
C. Peikert, V. Vaikuntanathan and B. Waters, A framework for e-cient and composable oblivious transfer, in: Advances in Cryptology (Crypto 2008), Lecture Notes in Comput. Sci. 5157, Springer, Berlin (2008), 554-571.
-
(2008)
Advances in Cryptology (Crypto 2008) Lecture Notes in Comput. Sci
, vol.5157
, pp. 554-571
-
-
Peikert, C.1
Vaikuntanathan, V.2
Waters, B.3
-
67
-
-
84855570859
-
Lossy trapdoor functions and their applications
-
C. Peikert and B. Waters, Lossy trapdoor functions and their applications, SIAM J. Comput. 40 (2011), no. 6, 1803-1844.
-
(2011)
SIAM J. Comput
, vol.40
, Issue.6
, pp. 1803-1844
-
-
Peikert, C.1
Waters, B.2
-
69
-
-
33745571012
-
On lattices learning with errors random linear codes, and cryptography
-
O. Regev, On lattices, learning with errors, random linear codes, and cryptography, in: Theory of Computing (STOC 2005), ACM Press, New York (2005), 84-93.
-
(2005)
Theory of Computing (STOC 2005)
, pp. 84-93
-
-
Regev, O.1
-
70
-
-
70349309809
-
On lattices, learning with errors random linear codes, and cryptography
-
O. Regev, On lattices, learning with errors, random linear codes, and cryptography, J. ACM 56 (2009), Article No. 34.
-
(2009)
J. ACM
, vol.56
-
-
Regev, O.1
-
71
-
-
77955253445
-
The learning with errors problem (invited survey)
-
IEEE Computer Society, Los Alamitos
-
O. Regev, The learning with errors problem (invited survey), in: IEEE Conference on Computational Complexity, IEEE Computer Society, Los Alamitos (2010), 191-204.
-
(2010)
IEEE Conference on Computational Complexity
, pp. 191-204
-
-
Regev, O.1
-
72
-
-
35248874386
-
Lattice reduction by random sampling and birthday methods theoretical aspects on computer science (STACS 2003)
-
Springer, Berlin
-
C. P. Schnorr, Lattice reduction by random sampling and birthday methods, in: Theoretical Aspects on Computer Science (STACS 2003), Lecture Notes in Comput. Sci. 2607, Springer, Berlin (2003), 145-156.
-
(2003)
Lecture Notes in Comput. Sci
, vol.2607
, pp. 145-156
-
-
Schnorr, C.P.1
-
73
-
-
33846200465
-
Lattice basis reduction: Improved practical algorithms and solving subset sum problems
-
C. P. Schnorr and M. Euchner, Lattice basis reduction: Improved practical algorithms and solving subset sum problems, Math. Program. 66 (1994), 181-199.
-
(1994)
Math. Program
, vol.66
, pp. 181-199
-
-
Schnorr, C.P.1
Euchner, M.2
-
75
-
-
84943767831
-
An overview of lattice reduction algorithms
-
D. Stehlé, An overview of lattice reduction algorithms, Invited talk at ICISC, 2013.
-
(2013)
Invited Talk at ICISC
-
-
Stehlé, D.1
-
76
-
-
84937560699
-
Sage Mathematics software version 6.3
-
W. Stein et al., Sage Mathematics Software Version 6.3, The Sage Development Team, 2014, www.sagemath.org.
-
(2014)
The Sage Development Team
-
-
Stein, W.1
-
77
-
-
84893417909
-
Estimating key sizes for high dimensional lattice-based systems
-
Springer, Berlin
-
J. van de Pol and N. P. Smart, Estimating key sizes for high dimensional lattice-based systems, in: Cryptography and Coding (IMACC 2013), Lecture Notes in Comput. Sci. 8308, Springer, Berlin (2013), 290-303.
-
(2013)
Cryptography and Coding (IMACC 2013), Lecture Notes in Comput Sci
, vol.8308
, pp. 290-303
-
-
Pol De J.Van1
Smart, N.P.2
-
78
-
-
84915804620
-
-
M. van Dijk, C. Gentry, S. Halevi and V. Vaikuntanathan, Fully homomorphic encryption over the integers, in: 38, 24-43.
-
Fully Homomorphic Encryption over the Integers
, vol.38
, pp. 24-43
-
-
Van Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
|