Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS

Linked e-resources

Details

Finding closest lattice vectors using approximate Voronoi cells
Evaluating the Potential for Hardware Acceleration of Four NTRU Based Key Encapsulation Mechanisms Using Software/Hardware Codesign
Forward-Secure Group Signatures from Lattices
Towards Practical Microcontroller Implementation of the Signature Scheme Falcon
Round5: Compact and Fast Post-Quantum Public-Key Encryption
The impact of error dependencies on Ring/Mod-LWE/LWR based schemes
Direct CCA-Secure KEM and Deterministic PKE from Plain LWE
Recovering short secret keys of RLCE in polynomial time
Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15
On the Complexity of Superdetermined Minrank Instances
Constant-Round Group Key Exchange from the Ring-RLWE Assumption
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange
Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model
(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model
Faster SeaSign signatures through improved rejection sampling
Thomas Decru, Lorenz Panny, and Frederik Vercauteren Genus Two Isogeny Cryptography
On Lions and Elligators: An efficient constant-time implementation of CSIDH
Quantum security of hash functions and property-preservation of iterated hashing
Improved Quantum Multicollision-Finding Algorithm
Preventing timing attacks against RQC using constant time decoding of Gabidulin codes
A traceable ring signature scheme based on coding theory
On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders.

Browse Subjects

Show more subjects...

Statistics

from
to
Export