Amanote Research
Register
Sign In
Public-Key Cryptosystems From the Worst-Case Shortest Vector Problem
doi 10.1145/1536414.1536461
Full Text
Open PDF
Abstract
Available in
full text
Date
January 1, 2009
Authors
Chris Peikert
Publisher
ACM Press
Related search
Quantum Public-Key Cryptosystems
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Immunizing Public Key Cryptosystems Against Chosen Ciphertext Attacks
IEEE Journal on Selected Areas in Communications
Computer Networks
Electronic Engineering
Electrical
Communications
Loopholes in Two Public Key Cryptosystems Using the Modular Group
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
A Three-Level Sieve Algorithm for the Shortest Vector Problem
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Erratum To: Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems
Journal of Cryptographic Engineering
Computer Networks
Software
Communications
Fully-Dynamic All-Pairs Shortest Paths: Improved Worst-Case Time and Space Bounds
A Polynomial Time Attack Against Algebraic Geometry Code Based Public Key Cryptosystems
Key Scheduling in Des Type Cryptosystems
Generalizing Cryptosystems Based on the Subset Sum Problem
International Journal of Information Security
Information Systems
Risk
Computer Networks
Communications
Reliability
Safety
Quality
Software