[PDF][PDF] Research Online
VNT Le, B Apopei, K Alameh - Sciences, 2018 - academia.edu
Abstract© The Institution of Engineering and Technology 2019. The modulus switching
technique has been used in some cryptographic applications as well as in cryptanalysis. For …
technique has been used in some cryptographic applications as well as in cryptanalysis. For …
Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem
S Uemura, K Fukushima, S Kiyomoto, M Kudo… - Advances in Information …, 2021 - Springer
Abstract The Learning With Rounding (LWR) problem has attracted increasing attention as a
foundation for post-quantum cryptosystems. It is known to be a variant of the Learning With …
foundation for post-quantum cryptosystems. It is known to be a variant of the Learning With …
Impact of<? show [AQ ID= Q1]?> the modulus switching technique on some attacks against learning problems
The modulus switching technique has been used in some cryptographic applications as well
as in cryptanalysis. For cryptanalysis against the learning with errors (LWE) problem and the …
as in cryptanalysis. For cryptanalysis against the learning with errors (LWE) problem and the …
Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem
M Kudo, T Takagi - … in Information and Computer Security: 16th …, 2021 - books.google.com
The Learning With Rounding (LWR) problem has attracted increasing attention as a
foundation for post-quantum cryptosystems. It is known to be a variant of the Learning With …
foundation for post-quantum cryptosystems. It is known to be a variant of the Learning With …
[PDF][PDF] Examining Various Implementation and Design Choices of LWR based KEM
S Kundu - 2020 - esat.kuleuven.be
The security of our current public-key cryptographic primitives is based on the hardness
assumption of the integer factorization and the elliptic curve discrete logarithm problems …
assumption of the integer factorization and the elliptic curve discrete logarithm problems …