×

Found 3 Documents (Results 1–3)

Dual-mode cryptosystem based on the learning with errors problem. (English) Zbl 1426.94103

Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10343, 443-451 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Leakage-resilient IND-CCA KEM from the extractable hash proofs with indistinguishability obfuscation. (English) Zbl 1404.94083

Chen, Kefei (ed.) et al., Information security and cryptology. 12th international conference, Inscrypt 2016, Beijing, China, November 4–6, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-54704-6/pbk; 978-3-319-54705-3/ebook). Lecture Notes in Computer Science 10143, 291-308 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Approximate-deterministic public key encryption from hard learning problems. (English) Zbl 1411.94075

Dunkelman, Orr (ed.) et al., Progress in cryptology – INDOCRYPT 2016. 17th international conference on cryptology in India, Kolkata, India, December 11–14, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10095, 25-42 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Year of Publication

Main Field