Author:
Cayrel Pierre-Louis,Meziani Mohammed,Ndiaye Ousmane,Lindner Richard,Silva Rosemberg
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Algebra and Number Theory
Reference32 articles.
1. Ajtai, M.: Generating hard instances of lattice problems. Electron. Colloq. Comput. Complex. (ECCC) 3(7), 99–108 (1996)
2. Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast cryptographic primitives and circular-secure encryption based on hard learning problems. In: Halevi, S. (ed.) CRYPTO, volume 5677 of Lecture Notes in Computer Science, pp. 595–618. Springer (2009)
3. Bellare, M., Boldyreva, A., Kurosawa, K., Staddon, J.: Multirecipient encryption schemes: How to save on bandwidth and computation without sacrificing security. IEEE Trans. Inf. Theory 53(11), 3927–3943 (2007)
4. Berbain, C., Gilbert, H., Patarin, J.: Quad: a multivariate stream cipher with provable security. J. Symb. Comput. 44(12), 1703–1723 (2009)
5. Bernstein, D.J., Buchmann, J., Dahmen, E.: Post Quantum Cryptography. Springer Publishing Company, Incorporated, Berlin (2008)