Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Eamonn W. Postlethwaite"'
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030939434
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::846a721d106f5e79d7a8df804ec28c30
https://doi.org/10.1007/978-3-030-93944-1_21
https://doi.org/10.1007/978-3-030-93944-1_21
Publikováno v:
ASIACRYPT 2022
Publikováno v:
Advances in Cryptology – ASIACRYPT 2022 ISBN: 9783031229718
We propose the signature scheme Hawk, a concrete instantiation of proposals to use the Lattice Isomorphism Problem (LIP) as a foundation for cryptography that focuses on simplicity. This simplicity stems from LIP, which allows the use of lattices suc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2f4bc68e0ba4cb37ffda74ed9bb6b85d
https://doi.org/10.1007/978-3-031-22972-5_3
https://doi.org/10.1007/978-3-031-22972-5_3
Publikováno v:
CCS
Continuous group key agreements (CGKAs) are a class of protocols that can provide strong security guarantees to secure group messaging protocols such as Signal and MLS. Protection against device compromise is provided by commit messages: at a regular
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f5093e177c4c0611f25fb1640e4476d6
https://ir.cwi.nl/pub/31198
https://ir.cwi.nl/pub/31198
Publikováno v:
Public-Key Cryptography – PKC 2021 ISBN: 9783030752446
Public Key Cryptography (1)
Public Key Cryptography (1)
As lattice-based key encapsulation, digital signature, and fully homomorphic encryption schemes near standardisation, ever more focus is being directed to the precise estimation of the security of these schemes. The primal attack reduces key recovery
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::da71019d9e5480863f27dcbdd41dd974
https://doi.org/10.1007/978-3-030-75245-3_4
https://doi.org/10.1007/978-3-030-75245-3_4
Publikováno v:
Advances in Cryptology – ASIACRYPT 2020 ISBN: 9783030648336
ASIACRYPT (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2020
Advances in Cryptology – ASIACRYPT 2020-26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II
ASIACRYPT (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2020
Advances in Cryptology – ASIACRYPT 2020-26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II
Quantum variants of lattice sieve algorithms are routinely used to assess the security of lattice based cryptographic constructions. In this work we provide a heuristic, non-asymptotic, analysis of the cost of several algorithms for near neighbour se
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::94bf7a93807afb58072b521b4483e1b2
https://doi.org/10.1007/978-3-030-64834-3_20
https://doi.org/10.1007/978-3-030-64834-3_20
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030345778
ASIACRYPT (1)
ASIACRYPT (1)
The Shortest Vector Problem (SVP) is one of the mathematical foundations of lattice based cryptography. Lattice sieve algorithms are amongst the foremost methods of solving SVP. The asymptotically fastest known classical and quantum sieves solve SVP
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::79702e4df07492704c27cd02e3610450
https://doi.org/10.1007/978-3-030-34578-5_19
https://doi.org/10.1007/978-3-030-34578-5_19
Autor:
Gottfried Herold, Marc Stevens, Eamonn W. Postlethwaite, Elena Kirshanova, Léo Ducas, Martin R. Albrecht
Publikováno v:
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – EUROCRYPT 2019
EUROCRYPT
EUROCRYPT, 2019, Darmstadt, Germany. pp.717-746, ⟨10.1007/978-3-030-17656-3_25⟩
Advances in Cryptology – EUROCRYPT 2019 ISBN: 9783030176556
EUROCRYPT (2)
Advances in Cryptology – EUROCRYPT 2019-38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part II
Lecture Notes in Computer Science-Advances in Cryptology – EUROCRYPT 2019
EUROCRYPT
EUROCRYPT, 2019, Darmstadt, Germany. pp.717-746, ⟨10.1007/978-3-030-17656-3_25⟩
Advances in Cryptology – EUROCRYPT 2019 ISBN: 9783030176556
EUROCRYPT (2)
Advances in Cryptology – EUROCRYPT 2019-38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part II
We propose the General Sieve Kernel (G6K, pronounced /Ze.si.ka/), an abstract stateful machine supporting a wide variety of lattice reduction strategies based on sieving algorithms. Using the basic instruction set of this abstract stateful machine, w
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c8ca9b6f20798ebdda7a9b208c9aa66b
https://ir.cwi.nl/pub/28539
https://ir.cwi.nl/pub/28539
Autor:
Rachel Player, Alex Davidson, Fernando Virdia, Thomas Wunderer, Benjamin R. Curtis, Amit Deo, Eamonn W. Postlethwaite, Martin R. Albrecht
Publikováno v:
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Security and Cryptography for Networks
Lecture Notes in Computer Science ISBN: 9783319981123
SCN
Security and Cryptography for Networks-11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedings
Lecture Notes in Computer Science-Security and Cryptography for Networks
Lecture Notes in Computer Science ISBN: 9783319981123
SCN
Security and Cryptography for Networks-11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedings
We consider all LWE- and NTRU-based encryption, key encapsulation, and digital signature schemes proposed for standardisation as part of the Post-Quantum Cryptography process run by the US National Institute of Standards and Technology (NIST). In par
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cb25a1e4a0bec8eba1866931636f7672