Lattice-based cryptography

Known as: Lattice, Lattice based cryptography 
Lattice-based cryptography is the generic term for asymmetric cryptographic primitives based on lattices. While lattice-based cryptography has been… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Among the different cryptosystems, the Public Key Cryptosystems (PKCS) are of great usage and are used in many applications. Most… (More)
Is this relevant?
2015
2015
The purpose of this lecture note is to introduce lattice based cryptography, which is thought to be a cryptosystem of post… (More)
Is this relevant?
2014
2014
Lattice-based cryptography provides a much stronger notion of security, in that the average-case of certain problems in lattice… (More)
  • figure 3
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Nearly all of the currently used and well-tested signature schemes (e.g. RSA or DSA) are based either on the factoring assumption… (More)
  • table 1
  • figure 3
  • figure 4
  • table 2
  • table 3
Is this relevant?
Highly Cited
2012
Highly Cited
2012
In recent years lattice-based cryptography has emerged as quantum secure and theoretically elegant alternative to classical… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
2009
2009
ly: Preimage Sampleable Function D R x u fA I Generalizes TDPs, claw-free pairs, Rabin, . . . I Can generate (x, u) in two… (More)
Is this relevant?
2008
2008
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x 
  • figure 2.1
  • figure 5.1
  • figure 5.2
  • figure 5.3
  • figure 6.1
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We describe some of the recent progress on lattice-based cryptography, starting from the seminal work of Ajtai, and ending with… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
Review
2005
Review
2005
In this chapter we describe some of the recent progress in lattice-based cryptography. Lattice-based cryptographic constructions… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
1999
1999
We describe a general technique to simplify as well as to improve several lattice based cryptographic protocols. The technique is… (More)
Is this relevant?