Amanote Research

Amanote Research

    RegisterSign In

Public-Key Cryptosystems From the Worst-Case Shortest Vector Problem

doi 10.1145/1536414.1536461
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2009

Authors
Chris Peikert
Publisher

ACM Press


Related search

Quantum Public-Key Cryptosystems

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2000English

Immunizing Public Key Cryptosystems Against Chosen Ciphertext Attacks

IEEE Journal on Selected Areas in Communications
Computer NetworksElectronic EngineeringElectricalCommunications
1993English

Loopholes in Two Public Key Cryptosystems Using the Modular Group

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2001English

A Three-Level Sieve Algorithm for the Shortest Vector Problem

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2014English

Erratum To: Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems

Journal of Cryptographic Engineering
Computer NetworksSoftwareCommunications
2012English

Fully-Dynamic All-Pairs Shortest Paths: Improved Worst-Case Time and Space Bounds

2020English

A Polynomial Time Attack Against Algebraic Geometry Code Based Public Key Cryptosystems

2014English

Key Scheduling in Des Type Cryptosystems

English

Generalizing Cryptosystems Based on the Subset Sum Problem

International Journal of Information Security
Information SystemsRiskComputer NetworksCommunicationsReliabilitySafetyQualitySoftware
2011English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy