Low Noise LPN: Key dependent message secure public key encryption an sample amplification (English)
Free access
- New search for: Döttling, Nico
- New search for: Döttling, Nico
In:
IET Information Security
;
10
, 6
;
372-385
;
2016
- Article (Journal) / Electronic Resource
-
Title:Low Noise LPN: Key dependent message secure public key encryption an sample amplification
-
Contributors:Döttling, Nico ( author )
-
Published in:IET Information Security ; 10, 6 ; 372-385
-
Publisher:
- New search for: The Institution of Engineering and Technology
-
Publication date:2016-11-01
-
Size:14 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Metadata by IET is licensed under CC BY 3.0
Table of contents – Volume 10, Issue 6
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 287
-
Guest EditorialKatz, Jonathan et al. | 2016
- 288
-
Public-key encryption indistinguishable under plaintext-checkable attacksAbdalla, Michel / Benhamouda, Fabrice / Pointcheval, David et al. | 2016
- 304
-
Selective opening security of practical public-key encryption schemesHeuer, Felix / Jager, Tibor / Schäge, Sven / Kiltz, Eike et al. | 2016
- 319
-
Adaptive proofs of knowledge in the random oracle modelBernhard, David / Fischlin, Marc / Warinschi, Bogdan et al. | 2016
- 332
-
Divisible e-cash made practicalCanard, Sébastien / Pointcheval, David / Sanders, Olivier / Traoré, Jacques et al. | 2016
- 348
-
Bootstrapping BGV ciphertexts with a wider choice of p and qOrsini, Emmanuela / van de Pol, Joop / Smart, Nigel P. et al. | 2016
- 358
-
Strongly-optimal structure preserving signatures from Type II pairings: synthesis and lower boundsBarthe, Gilles / Fagerholm, Edvard / Fiore, Dario / Scedrov, Andre / Schmidt, Benedikt / Tibouchi, Mehdi et al. | 2016
- 372
-
Low Noise LPN: Key dependent message secure public key encryption an sample amplificationDöttling, Nico et al. | 2016
- 403
-
Public key cryptosystems secure against memory leakage attacksSun, Shi-Feng / Han, Shuai / Gu, Dawu / Liu, Shengli et al. | 2016
- 413
-
Method for detecting text information leakage in electromagnetic radiation from a computer displaySun, De-Gang / Shi, Jun / Wei, Dong / Zhang, Meng / Huang, Wei-Qing et al. | 2016
- 418
-
Exception-oriented programming: retrofitting code-reuse attacks to construct kernel malwareDeng, Liang / Zeng, Qingkai et al. | 2016
- 425
-
Improved impossible differential attack on reduced version of Camellia with FL/FL−1 functionsLiu, Ya / Yang, Anren / Liu, Zhiqiang / Li, Wei / Wang, Qingju / Song, Liang / Gu, Dawu et al. | 2016
- 433
-
Hyperchaotic system-based pseudorandom number generatorLiu, Yang / Tong, Xiaojun et al. | 2016
- 442
-
Security of weak secrets based cryptographic primitives via the Rényi entropyYao, Yanqing / Li, Zhoujun et al. | 2016