Все публикации

Cryptography Based on Supersingular Isogenies

Information Theoretic One-Time Programs from Geometrically Local QNC_0 Adversaries

On the Finite Field Isomorphism Problem

Relating Code Equivalence to Other Isomorphism Problems

Asymptotic Improvements to Provable Algorithms for the Code Equivalence Problem

On a Conjecture About the Sum-Freedom of the Binary Multiplicative Inverse Function

CodeBreakHERs summer camp

How to attack LWE

How to decrypt a Module-LWE ciphertext

How to multiply polynomials modulo X^n +1

How to decrypt an LWE ciphertext

How to calculate the shortest vectors of a (small) lattice

How to decide if a lattice is a strict sublattice of another lattice

How to use Pollard's rho method for factoring

How to perform a low exponent attack against RSA

How to perform a CCA2 attack against bad RSA random padding

How to compute the modular inverse of a number

How to perform a binary exponentiation

How to evaluate Euler's phi function

How to solve simultaneous congruences with the CRT

How to estimate the effort to create a collision for a hash function

How to evaluate a block cipher

How to evaluate the advantage of an adversary in the PRF security game

How to calculate the advantage of an adversary in the semantic security game

join shbcf.ru