关注
Chris Peikert
Chris Peikert
Professor, Computer Science and Engineering, University of Michigan
在 alum.mit.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Trapdoors for hard lattices and new cryptographic constructions
C Gentry, C Peikert, V Vaikuntanathan
Proceedings of the fortieth annual ACM symposium on Theory of computing, 197-206, 2008
29252008
On ideal lattices and learning with errors over rings
V Lyubashevsky, C Peikert, O Regev
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
23122010
Trapdoors for lattices: Simpler, tighter, faster, smaller
D Micciancio, C Peikert
Annual International Conference on the Theory and Applications of …, 2012
14132012
Public-key cryptosystems from the worst-case shortest vector problem
C Peikert
Proceedings of the forty-first annual ACM symposium on Theory of computing …, 2009
11902009
Bonsai trees, or how to delegate a lattice basis
D Cash, D Hofheinz, E Kiltz, C Peikert
Journal of cryptology 25, 601-639, 2012
11032012
Better key sizes (and attacks) for LWE-based encryption
R Lindner, C Peikert
Topics in Cryptology–CT-RSA 2011: The Cryptographers’ Track at the RSA …, 2011
9522011
A framework for efficient and composable oblivious transfer
C Peikert, V Vaikuntanathan, B Waters
Annual international cryptology conference, 554-571, 2008
8742008
On ideal lattices and learning with errors over rings
V Lyubashevsky, C Peikert, O Regev
Journal of the ACM (JACM) 60 (6), 1-35, 2013
8352013
Classical hardness of learning with errors
Z Brakerski, A Langlois, C Peikert, O Regev, D Stehlé
Proceedings of the forty-fifth annual ACM symposium on Theory of computing …, 2013
8152013
Fast cryptographic primitives and circular-secure encryption based on hard learning problems
B Applebaum, D Cash, C Peikert, A Sahai
Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009
7752009
Lossy trapdoor functions and their applications
C Peikert, B Waters
Proceedings of the fortieth annual ACM symposium on Theory of computing, 187-196, 2008
7532008
A decade of lattice cryptography
C Peikert
Foundations and trends® in theoretical computer science 10 (4), 283-424, 2016
6902016
Pseudorandom functions and lattices
A Banerjee, C Peikert, A Rosen
Annual International Conference on the Theory and Applications of …, 2012
6062012
A toolkit for ring-LWE cryptography
V Lyubashevsky, C Peikert, O Regev
Annual international conference on the theory and applications of …, 2013
5462013
Lattice cryptography for the internet
C Peikert
International workshop on post-quantum cryptography, 197-219, 2014
5072014
An efficient and parallel Gaussian sampler for lattices
C Peikert
Annual Cryptology Conference, 80-97, 2010
4572010
Hardness of SIS and LWE with small parameters
D Micciancio, C Peikert
Annual cryptology conference, 21-39, 2013
4022013
Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices
C Peikert, A Rosen
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006 …, 2006
3922006
Faster bootstrapping with polynomial error
J Alperin-Sheriff, C Peikert
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
3892014
Generating shorter bases for hard random lattices
J Alwen, C Peikert
Theory of Computing Systems 48, 535-553, 2011
3652011
系统目前无法执行此操作,请稍后再试。
文章 1–20