# Lattice-based cryptography

## Papers overview

Semantic Scholar uses AI to extract papers important to this topic.

2017

2017

- 12th International Conference on Computerâ€¦
- 2017

Among the different cryptosystems, the Public Key Cryptosystems (PKCS) are of great usage and are used in many applications. Mostâ€¦Â (More)

Is this relevant?

2015

2015

- IACR Cryptology ePrint Archive
- 2015

The purpose of this lecture note is to introduce lattice based cryptography, which is thought to be a cryptosystem of postâ€¦Â (More)

Is this relevant?

2014

2014

- 2014

Lattice-based cryptography provides a much stronger notion of security, in that the average-case of certain problems in latticeâ€¦Â (More)

Is this relevant?

Highly Cited

2012

Highly Cited

2012

- CHES
- 2012

Nearly all of the currently used and well-tested signature schemes (e.g. RSA or DSA) are based either on the factoring assumptionâ€¦Â (More)

Is this relevant?

Highly Cited

2012

Highly Cited

2012

- LATINCRYPT
- 2012

In recent years lattice-based cryptography has emerged as quantum secure and theoretically elegant alternative to classicalâ€¦Â (More)

Is this relevant?

2009

2009

- TCC
- 2009

ly: Preimage Sampleable Function D R x u fA I Generalizes TDPs, claw-free pairs, Rabin, . . . I Can generate (x, u) in twoâ€¦Â (More)

Is this relevant?

2008

2008

- 2008

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xÂ

Is this relevant?

Highly Cited

2006

Highly Cited

2006

- CRYPTO
- 2006

We describe some of the recent progress on lattice-based cryptography, starting from the seminal work of Ajtai, and ending withâ€¦Â (More)

Is this relevant?

Review

2005

Review

2005

- Encyclopedia of Cryptography and Security
- 2005

In this chapter we describe some of the recent progress in lattice-based cryptography. Lattice-based cryptographic constructionsâ€¦Â (More)

Is this relevant?

1999

1999

- IACR Cryptology ePrint Archive
- 1999

We describe a general technique to simplify as well as to improve several lattice based cryptographic protocols. The technique isâ€¦Â (More)

Is this relevant?