Skip to main content
Ir a la página de inicio de la Comisión Europea (se abrirá en una nueva ventana)
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

PRivacy preserving pOst-quantuM systEms from advanced crypTograpHic mEchanisms Using latticeS

CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.

Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .

Resultado final

Survey on computational problems, cryptanalysis and basic tools (se abrirá en una nueva ventana)

D31 Survey on computational problems cryptanalysis and basic tools RPUM10 RUBThis deliverable will give details on the relatedwork on computational problems cryptanalysis and lattice trapdoors as well as a complete list of open problems that the WP will study

Intermediate results on computational problems, cryptanalysis and basic tools (se abrirá en una nueva ventana)

D3.2 Intermediate results on computational problems, cryptanalysis and basic tools (R,PU,M24, UR1) This deliverable will describe the progress that partners will have achieved in the half-life of the project, regarding computational problems, cryptanalysis and lattice trapdoors. The deliverable will also contain the related problems that remain open and that will be the object of research in the 24 remaining months.

Survey of existing building blocks for practical advanced protocols (se abrirá en una nueva ventana)

D4.1 Survey of existing building blocks for practical advanced protocols (R,PU,M10, ENSL) This deliverable will give details on the related-work on cryptographic building blocks for advanced protocols, as well as a complete list of open problems that the WP will study. In particular, detailed comparisons will be given among existing lattice-based signatures in the standard model and homomorphic commitment schemes.

Dissemination Plan (se abrirá en una nueva ventana)

D22 Dissemination Plan RPUM03 ENSLWill present dissemination activities that are planned

Final results on computational problems, cryptanalysis and basic tools (se abrirá en una nueva ventana)

D33 Final results on computational problems cryptanalysis and basic tools RPUM48 CWIThis deliverable gives the final recommendations on assumptions over various types structured and unstructured lattices automatized tool for security estimations of latticebased cryptosystems reports on the latticebased candidates submitted to the NIST and optimised software implementation of trapdoor generation and trapdoor inversion over one or more types of structured lattices

Intermediate results on privacy-preserving cryptographic protocols (se abrirá en una nueva ventana)

D5.2 Intermediate results on privacy-preserving cryptographic protocols (R,PU,M24, TNO) This deliverable will describe the progress that partners will have achieved in the half-life of the project, regarding privacy-preserving lattice-based protocols. The deliverable will also contain the related problems that remain open and that will be the object of research in the 24 remaining months.

Project Quality plan (se abrirá en una nueva ventana)

The project quality plan the project handbook

Final results on building blocks for practical advanced protocols (se abrirá en una nueva ventana)

D44 Final results on building blocks for practical advanced protocols RPUM48 UR1Reference implementations of the final protocols as well as a writeup of the currently most efficient latticebases cryptographic building blocks constructions

Survey of existing privacy-preserving cryptographic protocols (se abrirá en una nueva ventana)

D5.1 Survey of existing privacy-preserving cryptographic protocols (R,PU,M10, ORA) This deliverable will give details on the related-work on privacy-preserving cryptographic protocols, as well as a complete list of open problems that the WP will study.

Final results on privacy-preserving cryptographic protocols (se abrirá en una nueva ventana)

D54 Final results on privacypreserving cryptographic protocols RPUM48 UPCReference implementations of the final protocols as well as a writeup of the currently most efficient privacypreserving protocol constructions

Intermediate results on building blocks for practical advanced protocols (se abrirá en una nueva ventana)

D4.2 Intermediate results on building blocks for practical advanced protocols (R,PU,M24, WIS) This deliverable will describe the progress that partners will have achieved in the half-life of the project, regarding cryptographic building blocks. The deliverable will also contain the related problems that remain open and that will be the object of research in the 24 remaining months.

Project website (se abrirá en una nueva ventana)

D21 Project website DECPU M03 ENSLProjects website including project information news publications etc

Publicaciones

On the Quantum Complexity of the Continuous Hidden Subgroup Problem (se abrirá en una nueva ventana)

Autores: Koen de Boer, Léo Ducas, Serge Fehr
Publicado en: EUROCRYPT 2020. Lecture Notes in Computer Science, Edición vol 12106, 2020, Página(s) pp. 341–370
Editor: Springer
DOI: 10.1007/978-3-030-45724-2_12

Isochronous Gaussian Sampling: From Inception to Implementation - With Applications to the Falcon Signature Scheme (se abrirá en una nueva ventana)

Autores: James Howe, Thomas Prest, Thomas Ricosset, Mélissa Rossi
Publicado en: Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Paris, France, April 15–17, 2020, Proceedings, Edición 12100, 2020, Página(s) 53-71, ISBN 978-3-030-44222-4
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-44223-1_4

Cryptography from One-Way Communication: On Completeness of Finite Channels (se abrirá en una nueva ventana)

Autores: Shweta Agrawal, Yuval Ishai, Eyal Kushilevitz, Varun Narayanan, Manoj Prabhakaran, Vinod Prabhakaran, Alon Rosen
Publicado en: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III, Edición 12493, 2020, Página(s) 653-685, ISBN 978-3-030-64839-8
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-64840-4_22

Non-interactive Composition of Sigma-Protocols via Share-then-Hash (se abrirá en una nueva ventana)

Autores: Masayuki Abe, Miguel Ambrona, Andrej Bogdanov, Miyako Ohkubo, Alon Rosen
Publicado en: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III, Edición 12493, 2020, Página(s) 749-773, ISBN 978-3-030-64839-8
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-64840-4_25

Lattice Reduction with Approximate Enumeration Oracles - Practical Algorithms and Concrete Performance (se abrirá en una nueva ventana)

Autores: Martin R. Albrecht, Shi Bai, Jianwei Li, Joe Rowell
Publicado en: Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part II, Edición 12826, 2021, Página(s) 732-759, ISBN 978-3-030-84244-4
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-84245-1_25

Random Self-reducibility of Ideal-SVP via Arakelov Random Walks (se abrirá en una nueva ventana)

Autores: Koen de Boer, Léo Ducas, Alice Pellet-Mary, Benjamin Wesolowski
Publicado en: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II, Edición 12171, 2020, Página(s) 243-273, ISBN 978-3-030-56879-5
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-56880-1_9

(One) Failure Is Not an Option: Bootstrapping the Search for Failures in Lattice-Based Encryption Schemes (se abrirá en una nueva ventana)

Autores: Jan-Pieter D’Anvers, Mélissa Rossi, Fernando Virdia
Publicado en: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part III, Edición 12107, 2020, Página(s) 3-33, ISBN 978-3-030-45726-6
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-45727-3_1

Public-Coin Zero-Knowledge Arguments with (almost) Minimal Time and Space Overheads (se abrirá en una nueva ventana)

Autores: Alexander R. Block, Justin Holmgren, Alon Rosen, Ron D. Rothblum, Pratik Soni
Publicado en: Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part II, Edición 12551, 2020, Página(s) 168-197, ISBN 978-3-030-64377-5
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-64378-2_7

Lattice-based proof of a shuffle (se abrirá en una nueva ventana)

Autores: Núria Costa, Ramiro Martínez and Paz Morillo
Publicado en: Cryptography and Data Security. FC 2019, Edición vol 11599, 2020, Página(s) pp. 330–346, ISBN 978-3-030-43725-1
Editor: Springer
DOI: 10.1007/978-3-030-43725-1_23

Constant-Size Lattice-Based Group Signature with Forward Security in the Standard Model (se abrirá en una nueva ventana)

Autores: Sébastien Canard, Adela Georgescu, Guillaume Kaim, Adeline Roux-Langlois, Jacques Traoré
Publicado en: Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 – December 1, 2020, Proceedings, Edición 12505, 2020, Página(s) 24-44, ISBN 978-3-030-62575-7
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-62576-4_2

Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security (se abrirá en una nueva ventana)

Autores: Veronika Kuchta, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Shi-Feng Sun
Publicado en: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part III, Edición 12107, 2020, Página(s) 703-728, ISBN 978-3-030-45726-6
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-45727-3_24

Tighter Proofs of CCA Security in the Quantum Random Oracle Model (se abrirá en una nueva ventana)

Autores: Nina Bindel, Mike Hamburg, Kathrin Hövelmanns, Andraes Hülsing, Edoardo Perichetti
Publicado en: Theory of Cryptography TCC 2019, Edición vol 11892, 2019, Página(s) pp. 61–90, ISBN 978-3-030-36033-7
Editor: Springer
DOI: 10.1007/978-3-030-36033-7_3

Evaluating the Effectiveness of Heuristic Worst-Case Noise Analysis in FHE (se abrirá en una nueva ventana)

Autores: Anamaria Costache, Kim Laine, Rachel Player
Publicado en: Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part II, Edición 12309, 2020, Página(s) 546-565, ISBN 978-3-030-59012-3
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-59013-0_27

Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices (se abrirá en una nueva ventana)

Autores: Olivier Bernard, Adeline Roux-Langlois
Publicado en: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II, Edición 12492, 2020, Página(s) 349-380, ISBN 978-3-030-64833-6
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-64834-3_12

Practical Product Proofs for Lattice Commitments (se abrirá en una nueva ventana)

Autores: Thomas Attema, Vadim Lyubashevsky, Gregor Seiler
Publicado en: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II, Edición 12171, 2020, Página(s) 470-499, ISBN 978-3-030-56879-5
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-56880-1_17

Middle-Product Learning with Rounding Problem and Its Applications (se abrirá en una nueva ventana)

Autores: Shi Bai, Katharina Boudgoust, Dipayan Das, Adeline Roux-Langlois, Weiqiang Wen, Zhenfei Zhang
Publicado en: Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part I, Edición 11921, 2019, Página(s) 55-81, ISBN 978-3-030-34577-8
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-34578-5_3

FHE-Based Bootstrapping of Designated-Prover NIZK (se abrirá en una nueva ventana)

Autores: Zvika Brakerski, Sanjam Garg, Rotem Tsabary
Publicado en: Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part I, Edición 12550, 2020, Página(s) 657-683, ISBN 978-3-030-64374-4
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-64375-1_23

MPSign: A Signature from Small-Secret Middle-Product Learning with Errors (se abrirá en una nueva ventana)

Autores: Shi Bai, Dipayan Das, Ryo Hiromasa, Miruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Zhenfei Zhang
Publicado en: Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part II, Edición 12111, 2020, Página(s) 66-93, ISBN 978-3-030-45387-9
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-45388-6_3

Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security (se abrirá en una nueva ventana)

Autores: Benoît Libert, Khoa Nguyen, Alain Passelègue, Radu Titiu
Publicado en: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part I, Edición 12491, 2020, Página(s) 128-158, ISBN 978-3-030-64836-7
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-64837-4_5

Lattice-Based E-Cash, Revisited (se abrirá en una nueva ventana)

Autores: Amit Deo, Benoît Libert, Khoa Nguyen, Olivier Sanders
Publicado en: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II, Edición 12492, 2020, Página(s) 318-348, ISBN 978-3-030-64833-6
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-64834-3_11

Hardness of LWE on General Entropic Distributions (se abrirá en una nueva ventana)

Autores: Zvika Brakerski, Nico Döttling
Publicado en: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part II, Edición 12106, 2020, Página(s) 551-575, ISBN 978-3-030-45723-5
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-45724-2_19

Secure Computation from One-Way Noisy Communication, or: Anti-correlation via Anti-concentration (se abrirá en una nueva ventana)

Autores: Shweta Agrawal, Yuval Ishai, Eyal Kushilevitz, Varun Narayanan, Manoj Prabhakaran, Vinod Prabhakaran, Alon Rosen
Publicado en: Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part II, Edición 12826, 2021, Página(s) 124-154, ISBN 978-3-030-84244-4
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-84245-1_5

Transciphering, Using FiLIP and TFHE for an Efficient Delegation of Computation (se abrirá en una nueva ventana)

Autores: Clément Hoffmann, Pierrick Méaux, Thomas Ricosset
Publicado en: Progress in Cryptology – INDOCRYPT 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13–16, 2020, Proceedings, Edición 12578, 2020, Página(s) 39-61, ISBN 978-3-030-65276-0
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-65277-7_3

The Measure-and-Reprogram Technique 2.0: Multi-round Fiat-Shamir and More (se abrirá en una nueva ventana)

Autores: Jelle Don, Serge Fehr, Christian Majenz
Publicado en: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III, Edición 12172, 2020, Página(s) 602-631, ISBN 978-3-030-56876-4
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-56877-1_21

Fast Reduction of Algebraic Lattices over Cyclotomic Fields (se abrirá en una nueva ventana)

Autores: Paul Kirchner, Thomas Espitau, Pierre-Alain Fouque
Publicado en: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II, Edición 12171, 2020, Página(s) 155-185, ISBN 978-3-030-56879-5
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-56880-1_6

Faster Enumeration-Based Lattice Reduction: Root Hermite Factor $$k^{1/(2k)}$$ Time $$k^{k/8+o(k)}$$ (se abrirá en una nueva ventana)

Autores: Martin R. Albrecht, Shi Bai, Pierre-Alain Fouque, Paul Kirchner, Damien Stehlé, Weiqiang Wen
Publicado en: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II, Edición 12171, 2020, Página(s) 186-212, ISBN 978-3-030-56879-5
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-56880-1_7

Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings (se abrirá en una nueva ventana)

Autores: Julien Devevey, Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung
Publicado en: Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I, Edición 12710, 2021, Página(s) 659-690, ISBN 978-3-030-75244-6
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-75245-3_24

My vote, my (personal) data: remote electronic voting and the General Data Protection Regulation (se abrirá en una nueva ventana)

Autores: Adriá Rodrígues-Pérez
Publicado en: Electronic Voting E-Vote-ID 202, Edición vol 12455, 2020, Página(s) pp. 167–182, ISBN 978-3-030-60347-2
Editor: Springer
DOI: 10.1007/978-3-030-60347-2_11

Exploring Trade-offs in Batch Bounded Distance Decoding (se abrirá en una nueva ventana)

Autores: Martin R. Albrecht, Benjamin R. Curtis, Thomas Wunderer
Publicado en: Selected Areas in Cryptography – SAC 2019 - 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers, Edición 11959, 2020, Página(s) 467-491, ISBN 978-3-030-38470-8
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-38471-5_19

Round-Optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices (se abrirá en una nueva ventana)

Autores: Martin R. Albrecht, Alex Davidson, Amit Deo, Nigel P. Smart
Publicado en: Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part II, Edición 12711, 2021, Página(s) 261-289, ISBN 978-3-030-75247-7
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-75248-4_10

Faster Lattice-based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing (se abrirá en una nueva ventana)

Autores: Julien Duman, Kathrin Hövelmanns, Eike Kiltz, Vadim Lyubashevsky, Gregor Seiler
Publicado en: CCS '21, Edición 1351, 2021, Página(s) Pages 2722–2737
Editor: ACM Digital Library
DOI: 10.1145/3460120.3484819

Estimating Quantum Speedups for Lattice Sieves (se abrirá en una nueva ventana)

Autores: Martin R. Albrecht, Vlad Gheorghiu, Eamonn W. Postlethwaite, John M. Schanck
Publicado en: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II, Edición 12492, 2020, Página(s) 583-613, ISBN 978-3-030-64833-6
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-64834-3_20

Blind Functional Encryption (se abrirá en una nueva ventana)

Autores: Sébastien Canard, Adel Hamdi, Fabien Laguillaumie
Publicado en: Information and Communications Security - 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24–26, 2020, Proceedings, Edición 12282, 2020, Página(s) 183-201, ISBN 978-3-030-61077-7
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-61078-4_11

An Efficient and Provable Masked Implementation of qTESLA (se abrirá en una nueva ventana)

Autores: François Gérard, Mélissa Rossi
Publicado en: Smart Card Research and Advanced Applications - 18th International Conference, CARDIS 2019, Prague, Czech Republic, November 11–13, 2019, Revised Selected Papers, Edición 11833, 2020, Página(s) 74-91, ISBN 978-3-030-42067-3
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-42068-0_5

Improved Secure Integer Comparison via Homomorphic Encryption (se abrirá en una nueva ventana)

Autores: Florian Bourse, Olivier Sanders, Jacques Traoré
Publicado en: Topics in Cryptology – CT-RSA 2020 - The Cryptographers’ Track at the RSA Conference 2020, San Francisco, CA, USA, February 24–28, 2020, Proceedings, Edición 12006, 2020, Página(s) 391-416, ISBN 978-3-030-40185-6
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-40186-3_17

On the Ring-LWE and Polynomial-LWE Problems (se abrirá en una nueva ventana)

Autores: Miruna Rosca, Damien Stehlé, Alexandre Wallet
Publicado en: Advances in Cryptology – EUROCRYPT 2018, Edición 10820, 2018, Página(s) 146-173, ISBN 978-3-319-78380-2
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-78381-9_6

Estimate All the {LWE, NTRU} Schemes! (se abrirá en una nueva ventana)

Autores: Martin R. Albrecht, Benjamin R. Curtis, Amit Deo, Alex Davidson, Rachel Player, Eamonn W. Postlethwaite, Fernando Virdia, Thomas Wunderer
Publicado en: Security and Cryptography for Networks - 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedings, Edición 11035, 2018, Página(s) 351-367, ISBN 978-3-319-98112-3
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-98113-0_19

The General Sieve Kernel and New Records in Lattice Reduction (se abrirá en una nueva ventana)

Autores: Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, Marc Stevens
Publicado en: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part II, Edición 11477, 2019, Página(s) 717-746, ISBN 978-3-030-17655-6
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-17656-3_25

Approx-SVP in Ideal Lattices with Pre-processing (se abrirá en una nueva ventana)

Autores: Alice Pellet-Mary, Guillaume Hanrot, Damien Stehlé
Publicado en: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part II, Edición 11477, 2019, Página(s) 685-716, ISBN 978-3-030-17655-6
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-17656-3_24

Measuring, Simulating and Exploiting the Head Concavity Phenomenon in BKZ (se abrirá en una nueva ventana)

Autores: Shi Bai, Damien Stehlé, Weiqiang Wen
Publicado en: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part I, Edición 11272, 2018, Página(s) 369-404, ISBN 978-3-030-03325-5
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-03326-2_13

$$\delta $$ -subgaussian Random Variables in Cryptography (se abrirá en una nueva ventana)

Autores: Sean Murphy, Rachel Player
Publicado en: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings, Edición 11547, 2019, Página(s) 251-268, ISBN 978-3-030-21547-7
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-21548-4_14

Two-Message Statistically Sender-Private OT from LWE (se abrirá en una nueva ventana)

Autores: Zvika Brakerski, Nico Döttling
Publicado en: Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II, Edición 11240, 2018, Página(s) 370-390, ISBN 978-3-030-03809-0
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-03810-6_14

On the Shortness of Vectors to Be Found by the Ideal-SVP Quantum Algorithm (se abrirá en una nueva ventana)

Autores: Léo Ducas, Maxime Plançon, Benjamin Wesolowski
Publicado en: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part I, Edición 11692, 2019, Página(s) 322-351, ISBN 978-3-030-26947-0
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-26948-7_12

Learning Strikes Again: The Case of the DRS Signature Scheme (se abrirá en una nueva ventana)

Autores: Yang Yu, Léo Ducas
Publicado en: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II, Edición 11273, 2018, Página(s) 525-543, ISBN 978-3-030-03328-6
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-03329-3_18

Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model (se abrirá en una nueva ventana)

Autores: Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner
Publicado en: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part II, Edición 11693, 2019, Página(s) 356-383, ISBN 978-3-030-26950-0
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-26951-7_13

Lattice-Based Zero-Knowledge Arguments for Integer Relations (se abrirá en una nueva ventana)

Autores: Benoît Libert, San Ling, Khoa Nguyen, Huaxiong Wang
Publicado en: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II, Edición 10992, 2018, Página(s) 700-732, ISBN 978-3-319-96880-3
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-96881-0_24

Adaptively Secure Distributed PRFs from $$\mathsf {LWE}$$ (se abrirá en una nueva ventana)

Autores: Benoît Libert, Damien Stehlé, Radu Titiu
Publicado en: Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II, Edición 11240, 2018, Página(s) 391-421, ISBN 978-3-030-03809-0
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-03810-6_15

Masking the GLP Lattice-Based Signature Scheme at Any Order (se abrirá en una nueva ventana)

Autores: Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi
Publicado en: Advances in Cryptology – EUROCRYPT 2018, Edición 10821, 2018, Página(s) 354-384, ISBN 978-3-319-78374-1
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-78375-8_12

Zero-Knowledge Elementary Databases with More Expressive Queries (se abrirá en una nueva ventana)

Autores: Benoît Libert, Khoa Nguyen, Benjamin Hong Meng Tan, Huaxiong Wang
Publicado en: Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, Edición 11442, 2019, Página(s) 255-285, ISBN 978-3-030-17252-7
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-17253-4_9

Assessment of the Key-Reuse Resilience of NewHope (se abrirá en una nueva ventana)

Autores: Aurélie Bauer, Henri Gilbert, Guénaël Renault, Mélissa Rossi
Publicado en: Topics in Cryptology – CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedings, Edición 11405, 2019, Página(s) 272-292, ISBN 978-3-030-12611-7
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-12612-4_14

Fully Secure Attribute-Based Encryption for t-CNF from LWE (se abrirá en una nueva ventana)

Autores: Rotem Tsabary
Publicado en: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part I, Edición 11692, 2019, Página(s) 62-85, ISBN 978-3-030-26947-0
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-26948-7_3

A Refined Analysis of the Cost for Solving LWE via uSVP (se abrirá en una nueva ventana)

Autores: Shi Bai, Shaun Miller, Weiqiang Wen
Publicado en: Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings, Edición 11627, 2019, Página(s) 181-205, ISBN 978-3-030-23695-3
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-23696-0_10

Towards Practical Microcontroller Implementation of the Signature Scheme Falcon (se abrirá en una nueva ventana)

Autores: Tobias Oder, Julian Speith, Kira Höltgen, Tim Güneysu
Publicado en: Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papers, Edición 11505, 2019, Página(s) 65-80, ISBN 978-3-030-25509-1
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-25510-7_4

Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto (se abrirá en una nueva ventana)

Autores: Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu
Publicado en: Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, Edición 11443, 2019, Página(s) 534-564, ISBN 978-3-030-17258-9
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-17259-6_18

A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib (se abrirá en una nueva ventana)

Autores: Carlos Aguilar Melchor, Marc-Olivier Kilijian, Cédric Lefebvre, Thomas Ricosset
Publicado en: Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papers, Edición 11359, 2019, Página(s) 425-442, ISBN 978-3-030-12941-5
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-12942-2_32

More Efficient Algorithms for the NTRU Key Generation Using the Field Norm (se abrirá en una nueva ventana)

Autores: Thomas Pornin, Thomas Prest
Publicado en: Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, Edición 11443, 2019, Página(s) 504-533, ISBN 978-3-030-17258-9
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-17259-6_17

RLWE-Based Zero-Knowledge Proofs for Linear and Multiplicative Relations (se abrirá en una nueva ventana)

Autores: Ramiro Martínez, Paz Morillo
Publicado en: Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16–18, 2019, Proceedings, Edición 11929, 2019, Página(s) 252-277, ISBN 978-3-030-35198-4
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-35199-1_13

Divisible E-Cash from Constrained Pseudo-Random Functions (se abrirá en una nueva ventana)

Autores: Florian Bourse, David Pointcheval, Olivier Sanders
Publicado en: Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part I, Edición 11921, 2019, Página(s) 679-708, ISBN 978-3-030-34577-8
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-34578-5_24

Multi-Client Functional Encryption for Linear Functions in the Standard Model from LWE (se abrirá en una nueva ventana)

Autores: Benoît Libert, Radu Ţiţiu
Publicado en: Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part III, Edición 11923, 2019, Página(s) 520-551, ISBN 978-3-030-34617-1
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-34618-8_18

Order-LWE and the Hardness of Ring-LWE with Entropic Secrets (se abrirá en una nueva ventana)

Autores: Madalina Bolboceanu, Zvika Brakerski, Renen Perlman, Devika Sharma
Publicado en: Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II, Edición 11922, 2019, Página(s) 91-120, ISBN 978-3-030-34620-1
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-34621-8_4

Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control (se abrirá en una nueva ventana)

Autores: Zvika Brakerski, Yael Kalai
Publicado en: Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part II, Edición 12111, 2020, Página(s) 97-123, ISBN 978-3-030-45387-9
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-45388-6_4

Constant Ciphertext-Rate Non-committing Encryption from Standard Assumptions (se abrirá en una nueva ventana)

Autores: Zvika Brakerski, Pedro Branco, Nico Döttling, Sanjam Garg, Giulio Malavolta
Publicado en: Theory of Cryptography. TCC 2020, Edición volume 12550, 2020, Página(s) pp. 58–87, ISBN 978-3-030-64375-1
Editor: Springer
DOI: 10.1007/978-3-030-64375-1_3

On Bounded Distance Decoding with Predicate: Breaking the “Lattice Barrier” for the Hidden Number Problem (se abrirá en una nueva ventana)

Autores: Martin R. Albrecht, Nadia Heninger
Publicado en: Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part I, Edición 12696, 2021, Página(s) 528-558, ISBN 978-3-030-77869-9
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-77870-5_19

Integral Matrix Gram Root and Lattice Gaussian Sampling Without Floats (se abrirá en una nueva ventana)

Autores: Léo Ducas, Steven Galbraith, Thomas Prest, Yang Yu
Publicado en: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part II, Edición 12106, 2020, Página(s) 608-637, ISBN 978-3-030-45723-5
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-45724-2_21

An LLL Algorithm for Module Lattices (se abrirá en una nueva ventana)

Autores: Changmin Lee, Alice Pellet-Mary, Damien Stehlé, Alexandre Wallet
Publicado en: Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II, Edición 11922, 2019, Página(s) 59-90, ISBN 978-3-030-34620-1
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-34621-8_3

Advanced Lattice Sieving on GPUs, with Tensor Cores (se abrirá en una nueva ventana)

Autores: Léo Ducas, Marc Stevens, Wessel van Woerden
Publicado en: Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part II, Edición 12697, 2021, Página(s) 249-279, ISBN 978-3-030-77885-9
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-77886-6_9

Subtractive Sets over Cyclotomic Rings - Limits of Schnorr-Like Arguments over Lattices (se abrirá en una nueva ventana)

Autores: Martin R. Albrecht, Russell W. F. Lai
Publicado en: Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part II, Edición 12826, 2021, Página(s) 519-548, ISBN 978-3-030-84244-4
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-84245-1_18

Towards Practical GGM-Based PRF from (Module-)Learning-with-Rounding (se abrirá en una nueva ventana)

Autores: Chitchanok Chuengsatiansup and Damien Stehlé
Publicado en: Selected Areas in Cryptography – SAC 2019, Edición 11959, 2020, Página(s) pp. 693–713, ISBN 978-3-030-38471-5
Editor: Springer
DOI: 10.1007/978-3-030-38471-5_28

Bifurcated Signatures: Folding the Accountability vs. Anonymity Dilemma into a Single Private Signing Scheme (se abrirá en una nueva ventana)

Autores: Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung
Publicado en: Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part III, Edición 12698, 2021, Página(s) 521-552, ISBN 978-3-030-77882-8
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-77883-5_18

Generic Authenticated Key Exchange in the Quantum Random Oracle Model (se abrirá en una nueva ventana)

Autores: Kathrin Hövelmanns, Eike Kiltz, Sven Schäge, Dominique Unruh
Publicado en: Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part II, Edición 12111, 2020, Página(s) 389-422, ISBN 978-3-030-45387-9
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-45388-6_14

Authenticated Key-Exchange and Signatures with Tight Security in the Standard Model (se abrirá en una nueva ventana)

Autores: Shuai Han, Tibor Jager, Eike Kiltz, Shengli Liu, Jiaxin Pan, Doreen Riepel, Sven Schäge
Publicado en: Advances in Cryptology – CRYPTO 2021, Edición vol 12828, 2021, Página(s) pp. 670–700, ISBN 978-3-030-84259-8
Editor: Springer
DOI: 10.1007/978-3-030-84259-8_23

On the Integer Polynomial Learning with Errors Problem (se abrirá en una nueva ventana)

Autores: Julien Devevey, Amin Sakzad, Damien Stehlé, Ron Steinfeld
Publicado en: Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I, Edición 12710, 2021, Página(s) 184-214, ISBN 978-3-030-75244-6
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-75245-3_8

Lattice-Based Blind Signatures, Revisited (se abrirá en una nueva ventana)

Autores: Eduard Hauck, Eike Kiltz, Julian Loss, Ngoc Khanh Nguyen
Publicado en: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II, Edición 12171, 2020, Página(s) 500-529, ISBN 978-3-030-56879-5
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-56880-1_18

Limits on the Efficiency of (Ring) LWE Based Non-interactive Key Exchange (se abrirá en una nueva ventana)

Autores: Siyao Guo, Pritish Kamath, Alon Rosen, Katerina Sotiraki
Publicado en: Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I, Edición 12110, 2020, Página(s) 374-395, ISBN 978-3-030-45373-2
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-45374-9_13

LWE with Side Information: Attacks and Concrete Security Estimation (se abrirá en una nueva ventana)

Autores: Dana Dachman-Soled, Léo Ducas, Huijing Gong, Mélissa Rossi
Publicado en: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II, Edición 12171, 2020, Página(s) 329-358, ISBN 978-3-030-56879-5
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-56880-1_12

Lattice Attacks on NTRU and LWE: A History of Refinements

Autores: Martin Albrecht and Léo Ducas
Publicado en: Computational Cryptography, 2021
Editor: Cambridge University Press

Time- and Space-Efficient Arguments from Groups of Unknown Order (se abrirá en una nueva ventana)

Autores: Alexander R. Block, Justin Holmgren, Alon Rosen, Ron D. Rothblum, Pratik Soni
Publicado en: Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part IV, Edición 12828, 2021, Página(s) 123-152, ISBN 978-3-030-84258-1
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-84259-8_5

Adaptive Simulation Security for Inner Product Functional Encryption (se abrirá en una nueva ventana)

Autores: Shweta Agrawal, Benoît Libert, Monosij Maitra, Radu Titiu
Publicado en: Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I, Edición 12110, 2020, Página(s) 34-64, ISBN 978-3-030-45373-2
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-45374-9_2

Analysing the HPKE Standard (se abrirá en una nueva ventana)

Autores: Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel
Publicado en: Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part I, Edición 12696, 2021, Página(s) 87-116, ISBN 978-3-030-77869-9
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-77870-5_4

Tightly-Secure Authenticated Key Exchange, Revisited (se abrirá en una nueva ventana)

Autores: Tibor Jager, Eike Kiltz, Doreen Riepel, Sven Schäge
Publicado en: Advances in Cryptology – EUROCRYPT 2021, Edición 12696, 2021, Página(s) pp. 117–146, ISBN 978-3-030-77870-5
Editor: Springer
DOI: 10.1007/978-3-030-77870-5_5

Key Recovery from Gram–Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices (se abrirá en una nueva ventana)

Autores: Pierre-Alain Fouque, Paul Kirchner, Mehdi Tibouchi, Alexandre Wallet, Yang Yu
Publicado en: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part III, Edición 12107, 2020, Página(s) 34-63, ISBN 978-3-030-45726-6
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-45727-3_2

ModFalcon: Compact Signatures Based On Module-NTRU Lattices (se abrirá en una nueva ventana)

Autores: Chitchanok Chuengsatiansup, Thomas Prest, Damien Stehlé, Alexandre Wallet, Keita Xagawa
Publicado en: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, 2020, Página(s) 853-866, ISBN 9781450367509
Editor: ACM
DOI: 10.1145/3320269.3384758

Compressing Proofs of k-Out-Of-n Partial Knowledge (se abrirá en una nueva ventana)

Autores: Thomas Attema, Ronald Cramer and Serge Fehr
Publicado en: Advances in Cryptology – CRYPTO 2021, Edición 12828, 2021
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-84259-8_3

On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption (se abrirá en una nueva ventana)

Autores: Benjamin R. Curtis, Rachel Player
Publicado en: Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography - WAHC'19, 2019, Página(s) 1-10, ISBN 9781450368292
Editor: ACM Press
DOI: 10.1145/3338469.3358940

Tight Adaptive Reprogramming in the QROM (se abrirá en una nueva ventana)

Autores: Grilo, Alex B.; Hövelmanns, Kathrin; Hülsing, Andreas; Majenz, Christian; Tibouchi, Mehdi; Wang, Huaxiong
Publicado en: Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Edición 14, 2021
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-92062-3_22

Improved privacy-preserving training using fixed-Hessian minimisation

Autores: Tabitha Ogilvie, Rachel Player and Joe Rowell
Publicado en: WAHC 2020 – 8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2020
Editor: IACR

On the hardness of Module-LWE with binary secrets (se abrirá en una nueva ventana)

Autores: Katharina Boudgoust, Corentin Jeudi, Adeline Roux-Langlois, Weiqiang Wen
Publicado en: CT-RSA 2021, 2021, ISBN 978-3-030-75539-3
Editor: Springer
DOI: 10.1007/978-3-030-75539-3_21

BAT: Small and Fast KEM over NTRU Lattices

Autores: Pierre-Alain Fouque, Paul Kirchner, Thomas Pornin, Yang Yu
Publicado en: TCHES 2022, 2022
Editor: Springer International Publishing

Shorter Lattice-based Zero-Knowledge Proofs for the Correctness of a Shuffle

Autores: Javier Herranz, Ramiro Martínez and Manuel Sánchez
Publicado en: VOTING'2021 (Financial Cryptography Workshops), 2021
Editor: IACR

Acyclicity Programming for Sigma-Protocols (se abrirá en una nueva ventana)

Autores: Masayuki Abe, Miguel Ambrona, Andrej Bogdanov, Miyako Ohkubo, Alon Rosen
Publicado en: Theory of Cryptography. TCC 2021, 2021
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-90459-3_15

An Anonymous Trace-and-Revoke Broadcast Encryption Scheme (se abrirá en una nueva ventana)

Autores: Olivier Blazy, Sayantan Mukherjee, Huyen Nguyen, Duong Hieu Phan and Damien Stehlé
Publicado en: Information Security and Privacy. ACISP 2021, Edición 13083, 2021
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-90567-5_11

A Hard Crystal - Implementing Dilithium on Reconfigurable Hardware (se abrirá en una nueva ventana)

Autores: Georg Land, Pascal Sasdrich, Tim Güneysu
Publicado en: Smart Card Research and Advanced Applications - CARDIS 2021, 2021
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-97348-3_12

GALACTICS - Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited (se abrirá en una nueva ventana)

Autores: Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi
Publicado en: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Página(s) 2147-2164, ISBN 9781450367479
Editor: ACM
DOI: 10.1145/3319535.3363223

Implementation of Lattice Trapdoors on Modules and Applications (se abrirá en una nueva ventana)

Autores: Pauline Bert, Gautier Eberhart, Lucas Prabel, Adeline Roux-Langlois, Mohamed Sabt
Publicado en: Post-Quantum Cryptography. PQCrypto 2021, Edición 12841, 2021
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-81293-5_11

A Compressed Sigma-Protocol Theory for Lattices

Autores: Thomas Attema, Ronald Cramer and Lisa Kohl
Publicado en: Advances in Cryptology – CRYPTO 2021, Edición 12828, 2021
Editor: Springer International Publishing

Batch-OT with Optimal Rate (se abrirá en una nueva ventana)

Autores: Zvika Brakerski, Pedro Branco, Nico Döttling, Sihang Pu
Publicado en: dvances in Cryptology - EUROCRYPT 2022 - 41th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, 2022
Editor: Springer International Publishing
DOI: 10.1007/978-3-031-07085-3_6

Towards Classical Hardness of Module LWE: The Linear Rank Case (se abrirá en una nueva ventana)

Autores: Katharina Boudgoust, Corentin Jeudi, Adeline Roux-Langlois and Weiqiang Wen
Publicado en: Lecture Notes in Computer Science ASIACRYPT 2020, Edición vol 12492, 2020
Editor: Springer
DOI: 10.1007/978-3-030-64834-3_10

Towards Faster Polynomial-Time Lattice Reduction (se abrirá en una nueva ventana)

Autores: Paul Kirchner, Thomas Espitau, Pierre-Alain Fouque
Publicado en: CRYPTO 2021, 2021
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-84245-1_26

On the impossibility of Purely Algebraic Signatures (se abrirá en una nueva ventana)

Autores: Nico Döttling, Dominik Hartmann, Dennis Hofheinz, Eike Kiltz, Sven Schäge, Bogdan Ursu
Publicado en: Theory of Cryptography - TCC 2021, Edición vol 13044, 2021, Página(s) pp. 317–349, ISBN 978-3-030-90455-5
Editor: Springer
DOI: 10.1007/978-3-030-90456-2_11

On the hardness of the NTRU problem (se abrirá en una nueva ventana)

Autores: Alice Pellet-Mary, Damien Stehlé
Publicado en: Advances in Cryptology – ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Virtual, 2021
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-92062-3_1

Implementing RLWE-based Schemes Using an RSA Co-Processor (se abrirá en una nueva ventana)

Autores: Martin R. Albrecht Christian Hanser Andrea Hoeller Thomas Pöppelmann Fernando Virdia Andreas Wallner
Publicado en: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019
Editor: TCHES
DOI: 10.13154/tches.v2019.i1.169-208

Cold Boot Attacks on Ring and Module LWE Keys Under the NTT (se abrirá en una nueva ventana)

Autores: Martin R. Albrecht Amit Deo Kenneth G. Paterson
Publicado en: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018
Editor: TCHES
DOI: 10.13154/tches.v2018.i3.173-213

Post-Quantum Resistant E-Voting Scheme (se abrirá en una nueva ventana)

Autores: Guillaume Kaim, Sébastien Canard, Adeline Roux-Langlois and Jacques Traore
Publicado en: Post-quantum Online Voting Scheme. FC 2021 - Financial Cryptography and Data Security. International Workshops, 2021, Página(s) pp.290-305
Editor: Univ. Rennes
DOI: 10.1007/978-3-662-63958-0_25

Degree 2 is Complete for the Round-Complexity of Malicious MPC (se abrirá en una nueva ventana)

Autores: Benny Applebaum, Zvika Brakerski, Rotem Tsabary
Publicado en: EUROCRYPT 2019, Edición 11477, 2019, Página(s) 504-531
Editor: Springer
DOI: 10.1007/978-3-030-17656-3_18

NTRU Fatigue: How Stretched is Overstretched? (se abrirá en una nueva ventana)

Autores: Léo Ducas and Wessel van Woerden
Publicado en: Advances in Cryptology – ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Virtual, 2021
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-92068-5_1

Mitaka: a simpler, parallelizable, maskable variant of Falcon

Autores: Thomas Espitau, Pierre-Alain Fouque, François Gérard, Mélissa Rossi, Akira Takahashi, Mehdi Tibouchi, Alexandre Wallet, Yang Yu
Publicado en: Advances in Cryptology - EUROCRYPT 2022 - 41th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, 2022
Editor: Springer InternationalPublishing

On the Lattice Isomorphism Problem, Quadratic Forms, Remarkable Lattices, and Cryptography (se abrirá en una nueva ventana)

Autores: Léo Ducas and Wessel van Woerden
Publicado en: Advances in Cryptology - EUROCRYPT 2022 - 41th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, Edición vol 13277, 2022, Página(s) pp. 643–673
Editor: Springer International Publishing
DOI: 10.1007/978-3-031-07082-2_23

Finding a Nash equilibrium is no easier than breaking Fiat-Shamir (se abrirá en una nueva ventana)

Autores: Arka Rai Choudhuri, Pavel Hubáček, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, Guy N. Rothblum
Publicado en: Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, 2019, Página(s) 1103-1114, ISBN 9781450367059
Editor: ACM
DOI: 10.1145/3313276.3316400

Discretisation and Product Distributions in Ring-LWE (se abrirá en una nueva ventana)

Autores: Sean Murphy, Rachel Player
Publicado en: Journal of Mathematical Cryptology, Edición 15 (1), 2021, Página(s) 45-59, ISSN 1862-2984
Editor: De Gruyter
DOI: 10.1515/jmc-2020-0073

Cryptography from Information Loss

Autores: Marshall Ball, Elette Boyle, Akshay Degwekar, Apoorvaa Deshpande, Alon Rosen, Vinod Vaikuntanathan, and Prashant Nalini Vasudevan
Publicado en: ICTS 2020, Edición Article No. 81, 2020, Página(s) pp. 81:1–81:27, ISSN 2509-8195
Editor: Dagstuhl Publishing

R-LWE-Based distributed key generation and threshold decryption (se abrirá en una nueva ventana)

Autores: Paz Morillo; Ferran Alborch; Ramiro Martínez Pinilla
Publicado en: Mathematics; Volume 10; Edición 5; Pages: 728, Edición 14, 2022, ISSN 2227-7390
Editor: Mathematics
DOI: 10.3390/math10050728

Can PPAD Hardness be Based on Standard Cryptographic Assumptions? (se abrirá en una nueva ventana)

Autores: Alon Rosen, Gil Segev, Ido Shahaf
Publicado en: Journal of Cryptology, 2021, ISSN 1432-1378
Editor: Springer International Publishing
DOI: 10.1007/s00145-020-09369-6

A note on short invertible ring elements and applications to cyclotomic and trinomials number fields

Autores: Thomas Attema, Ronald Cramer, and Chaoping Xing
Publicado en: Journal of Mathematical Cryptology, Edición 1, 2021, Página(s) 45-70, ISSN 1862-2984
Editor: De Gruyter

Loop-Abort Faults on Lattice-Based Signatures and Key Exchange Protocols (se abrirá en una nueva ventana)

Autores: Thomas Espitau, Pierre-Alain Fouque, Benoit Gerard, Mehdi Tibouchi
Publicado en: IEEE Transactions on Computers, 2018, Página(s) 1-1, ISSN 0018-9340
Editor: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tc.2018.2833119

On the smoothing parameter and last minimum of random orthogonal lattices (se abrirá en una nueva ventana)

Autores: Elena Kirshanova, Huyen Nguyen, Damien Stehlé, Alexandre Wallet
Publicado en: Designs, Codes and Cryptography, Edición 88/5, 2020, Página(s) 931-950, ISSN 0925-1022
Editor: Kluwer Academic Publishers
DOI: 10.1007/s10623-020-00719-w

The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon (se abrirá en una nueva ventana)

Autores: Morgane Guerreau, Ange Martinelli, Thomas Ricosset and Mélissa Rossi
Publicado en: TCHES 2022 - IACR Transactions on Cryptographic Hardware and Embedded Systems, Edición 3, 2022, Página(s) pp. 141-164–24, ISSN 2569-2925
Editor: IACR
DOI: 10.46586/tches.v2022.i3.141-164

Mildly Short Vectors in Cyclotomic Ideal Lattices in Quantum Polynomial Time (se abrirá en una nueva ventana)

Autores: Ronald Cramer, Léo Ducas, Benjamin Wesolowski
Publicado en: Journal of the ACM, Edición 68/2, 2021, Página(s) 1-26, ISSN 0004-5411
Editor: Association for Computing Machinary, Inc.
DOI: 10.1145/3431725

An Algorithmic Reduction Theory for Binary Codes: LLL and more (se abrirá en una nueva ventana)

Autores: Thomas Debris-Alazard, Léo Ducas, Wessel P.J. Van Woerden
Publicado en: IEEE Transactions on Information Theory, Edición 00189448, 2022, ISSN 0018-9448
Editor: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tit.2022.3143620

Derechos de propiedad intelectual

METHOD FOR SECURING THE BALANCE OF AN ELECTRONIC ACCOUNT

Número de solicitud/publicación: 20 216337
Fecha: 2020-12-22
Solicitante(s): THALES SIX GTS FRANCE SAS

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles

Mi folleto 0 0