filmov
tv
Attacks on Ring-LWE
Показать описание
Kristin Lauter, Microsoft Research Redmond
The Mathematics of Modern Cryptography
Simons Institute
Simons Institute
UC Berkeley
computer science
theory of computing
Cryptography
Рекомендации по теме
0:37:45
Attacks on Ring-LWE
0:39:38
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT
0:51:17
Katherine E. Stange: Ring learning with errors and rounding
0:56:20
LWE with Side Information: Attacks and Concrete Security Estimation
0:24:30
A KEM based on Module-LWE
0:15:39
How to attack LWE
0:14:44
Limits on the Efficiency of (Ring) LWE Based Non-interactive Key Exchange
0:23:27
Provably Weak Instances of Ring-LWE Revisited
0:14:34
Practical CCA2 Secure and Masked Ring LWE Implementation
0:20:15
Implementing Conjunction Obfuscation under Entropic Ring LWE
0:44:30
Security and encoding in Fully Homomorphic Encryption: Rachel Player, Sorbonne Université
0:28:40
35 A masked ring LWE implementation
0:17:41
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices
0:20:38
On dual lattice attacks against small secret LWE and parameter choices in HElib and SEAL
0:28:54
Lattice Crypto: Ring LWE with Key Exchange
0:20:20
On the security of the multivariate ring learning with errors problem
0:56:49
Lattice Attacks for Variants of LWE
0:18:27
Large Modulus Ring LWE ^= Module LWE
0:18:51
An Improved Practical Key Mismatch Attack Against NTRU
1:18:01
s-4: LWE and Encryption
0:17:06
Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem
0:40:01
Post-Quantum
0:19:27
Revisiting Lattice Attacks on overstretched NTRU parameters
0:58:36
Maria Francis -- Ideal lattices in Ring-LWE Cryptography -- CSE Theory Seminar, IITH