LP Solutions of Vectorial Integer Subset Sums – Cryptanalysis of Galbraith’s Binary Matrix LWE (Englisch)
- Neue Suche nach: Herold, Gottfried
- Neue Suche nach: May, Alexander
- Neue Suche nach: Fehr, Serge
- Neue Suche nach: Herold, Gottfried
- Neue Suche nach: May, Alexander
In:
Public-Key Cryptography – PKC 2017
: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I
;
Kapitel: 1
;
3-15
;
2017
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:LP Solutions of Vectorial Integer Subset Sums – Cryptanalysis of Galbraith’s Binary Matrix LWE
-
Weitere Titelangaben:Lect.Notes Computer
-
Beteiligte:
-
Kongress:IACR International Workshop on Public Key Cryptography ; 2017 ; Amsterdam, The Netherlands
-
Erschienen in:Public-Key Cryptography – PKC 2017 : 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I ; Kapitel: 1 ; 3-15Lecture Notes in Computer Science ; 10174 ; 3-15Security and Cryptology ; 3-15
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:26.02.2017
-
Format / Umfang:13 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
LP Solutions of Vectorial Integer Subset Sums – Cryptanalysis of Galbraith’s Binary Matrix LWEHerold, Gottfried / May, Alexander et al. | 2017
- 2
-
Improved Algorithms for the Approximate k-List Problem in Euclidean NormHerold, Gottfried / Kirshanova, Elena et al. | 2017
- 3
-
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13Coron, Jean-Sébastien / Lee, Moon Sung / Lepoint, Tancrède / Tibouchi, Mehdi et al. | 2017
- 4
-
Cut Down the Tree to Achieve Constant Complexity in Divisible E-cashPointcheval, David / Sanders, Olivier / Traoré, Jacques et al. | 2017
- 5
-
Asymptotically Tight Bounds for Composing ORAM with PIRAbraham, Ittai / Fletcher, Christopher W. / Nayak, Kartik / Pinkas, Benny / Ren, Ling et al. | 2017
- 6
-
Predictable Arguments of KnowledgeFaonio, Antonio / Nielsen, Jesper Buus / Venturi, Daniele et al. | 2017
- 7
-
Removing Erasures with Explainable Hash Proof SystemsAbdalla, Michel / Benhamouda, Fabrice / Pointcheval, David et al. | 2017
- 8
-
Scalable Multi-party Private Set-IntersectionHazay, Carmit / Venkitasubramaniam, Muthuramakrishnan et al. | 2017
- 9
-
Tightly Secure IBE Under Constant-Size Master Public KeyChen, Jie / Gong, Junqing / Weng, Jian et al. | 2017
- 10
-
Separating IND-CPA and Circular Security for Unbounded Length Key CyclesGoyal, Rishab / Koppula, Venkata / Waters, Brent et al. | 2017
- 11
-
Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable CiphertextsLibert, Benoît / Peters, Thomas / Qian, Chen et al. | 2017
- 12
-
Non-malleable Codes with Split-State RefreshFaonio, Antonio / Nielsen, Jesper Buus et al. | 2017
- 13
-
Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-malleable CodesDachman-Soled, Dana / Kulkarni, Mukul / Shahverdi, Aria et al. | 2017
- 14
-
Fully Leakage-Resilient CodesFaonio, Antonio / Nielsen, Jesper Buus et al. | 2017
- 15
-
On the Bit Security of Elliptic Curve Diffie–HellmanShani, Barak et al. | 2017
- 16
-
Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension DegreeKim, Taechan / Jeong, Jinhyuck et al. | 2017
- 17
-
Provably Secure NTRU Instances over Prime Cyclotomic RingsYu, Yang / Xu, Guangwu / Wang, Xiaoyun et al. | 2017
- 18
-
Equivalences and Black-Box Separations of Matrix Diffie-Hellman ProblemsVillar, Jorge L. et al. | 2017