Sciweavers

Share
112 search results - page 1 / 23
» Ring-LWE in Polynomial Rings
Sort
View
PKC
2012
Springer
234views Cryptology» more  PKC 2012»
7 years 2 months ago
Ring-LWE in Polynomial Rings
Abstract. The Ring-LWE problem, introduced by Lyubashevsky, Peikert, and Regev (Eurocrypt 2010), has been steadily finding many uses in numerous cryptographic applications. Still,...
Léo Ducas, Alain Durmus
IACR
2016
126views Biometrics» more  IACR 2016»
3 years 8 months ago
Provably Weak Instances of Ring-LWE Revisited
Abstract. In CRYPTO 2015, Elias, Lauter, Ozman and Stange described an attack on the non-dual decision version of the ring learning with errors problem (RLWE) for two special famil...
Wouter Castryck, Ilia Iliashenko, Frederik Vercaut...
CRYPTO
2011
Springer
245views Cryptology» more  CRYPTO 2011»
7 years 12 months ago
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
We present a somewhat homomorphic encryption scheme that is both very simple to describe and analyze, and whose security (quantumly) reduces to the worst-case hardness of problems ...
Zvika Brakerski, Vinod Vaikuntanathan
IACR
2016
32views Biometrics» more  IACR 2016»
3 years 8 months ago
Implementing a Toolkit for Ring-LWE Based Cryptography in Arbitrary Cyclotomic Number Fields
Recent research in the field of lattice-based cryptography, especially on the topic of the ring-based primitive ring-LWE, provided efficient and practical ring-based cryptographi...
Christoph M. Mayer
IACR
2016
35views Biometrics» more  IACR 2016»
3 years 8 months ago
Cryptanalysis of ring-LWE based key exchange with key share reuse
ct This paper shows how several ring-LWE based key exchange protocols can be broken, under the assumption that the same key share is used for multiple exchanges. This indicates tha...
Scott R. Fluhrer
books