NUK - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

3 4 5 6 7
zadetkov: 106
41.
  • An LLL-reduction algorithm ... An LLL-reduction algorithm with quasi-linear time complexity
    Novocin, Andrew; Stehlé, Damien; Villard, Gilles Proceedings of the forty-third annual ACM symposium on Theory of computing, 06/2011
    Conference Proceeding
    Recenzirano

    We devise an algorithm, L1, with the following specifications: It takes as input an arbitrary basis B=(bi)i ∈ Zd x d of a Euclidean lattice L; It computes a basis of L which is reduced for a mild ...
Celotno besedilo

PDF
42.
  • Analyzing Blockwise Lattice... Analyzing Blockwise Lattice Algorithms Using Dynamical Systems
    Hanrot, Guillaume; Pujol, Xavier; Stehlé, Damien Advances in Cryptology – CRYPTO 2011
    Book Chapter
    Recenzirano
    Odprti dostop

    Strong lattice reduction is the key element for most attacks against lattice-based cryptosystems. Between the strongest but impractical HKZ reduction and the weak but fast LLL reduction, there have ...
Celotno besedilo

PDF
43.
Celotno besedilo

PDF
44.
  • RIGOROUS PERTURBATION BOUND... RIGOROUS PERTURBATION BOUNDS OF SOME MATRIX FACTORIZATIONS
    CHANG, X.-W; STEHLE, D SIAM journal on matrix analysis and applications, 01/2010, Letnik: 31, Številka: 5
    Journal Article
    Recenzirano
    Odprti dostop

    This article presents rigorous normwise perturbation bounds for the Cholesky, LU, and QR factorizations with normwise or componentwise perturbations in the given matrix. The considered componentwise ...
Celotno besedilo

PDF
45.
Celotno besedilo

PDF
46.
  • Homomorphic Multiple Precis... Homomorphic Multiple Precision Multiplication for CKKS and Reduced Modulus Consumption
    Cheon, Jung Hee; Cho, Wonhee; Kim, Jaehyung ... Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 11/2023
    Conference Proceeding

    Homomorphic Encryption (HE) schemes such as BGV, BFV, and CKKS consume some ciphertext modulus for each multiplication. Bootstrapping (BTS) restores the modulus and allows homomorphic computation to ...
Celotno besedilo
47.
Celotno besedilo

PDF
48.
  • Short Bases of Lattices ove... Short Bases of Lattices over Number Fields
    Fieker, Claus; Stehlé, Damien Algorithmic Number Theory
    Book Chapter
    Recenzirano
    Odprti dostop

    Lattices over number fields arise from a variety of sources in algorithmic algebra and more recently cryptography. Similar to the classical case of ℤ-lattices, the choice of a nice, “short” ...
Celotno besedilo

PDF
49.
  • Accelerating Lattice Reduct... Accelerating Lattice Reduction with FPGAs
    Detrey, Jérémie; Hanrot, Guillaume; Pujol, Xavier ... Progress in Cryptology – LATINCRYPT 2010
    Book Chapter, Conference Proceeding
    Recenzirano
    Odprti dostop

    We describe an FPGA accelerator for the Kannan–Fincke–Pohst enumeration algorithm (KFP) solving the Shortest Lattice Vector Problem (SVP). This is the first FPGA implementation of KFP specifically ...
Celotno besedilo

PDF
50.
  • Quantum Oblivious LWE Sampling and Insecurity of Standard Model Lattice-Based SNARKs
    Thomas Debris-Alazard; Fallahpour, Pouria; Stehlé, Damien arXiv.org, 05/2024
    Paper, Journal Article
    Odprti dostop

    The Learning With Errors (\(\mathsf{LWE}\)) problem asks to find \(\mathbf{s}\) from an input of the form \((\mathbf{A}, \mathbf{b} = \mathbf{A}\mathbf{s}+\mathbf{e}) \in (\mathbb{Z}/q\mathbb{Z})^{m ...
Celotno besedilo
3 4 5 6 7
zadetkov: 106

Nalaganje filtrov