Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
On the concrete hardness of learning with errors
The learning with errors (LWE) problem has become a central building block of modern
cryptographic constructions. This work collects and presents hardness results for concrete …
cryptographic constructions. This work collects and presents hardness results for concrete …
Post-quantum cryptography
Cryptography is essential for the security of online communication, cars and implanted
medical devices. However, many commonly used cryptosystems will be completely broken …
medical devices. However, many commonly used cryptosystems will be completely broken …
[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …
publickey cryptographic algorithms through a public, competition-like process. The new …
[PDF][PDF] CRYSTALS-Kyber algorithm specifications and supporting documentation
• Increase noise parameter for Kyber512 In the round-2 submission of Kyber, the decryption
error for Kyber512 was rather conservative, while at the same time, there were requests to …
error for Kyber512 was rather conservative, while at the same time, there were requests to …
Post-quantum key {Exchange—A} new hope
At IEEE Security & Privacy 2015, Bos, Costello, Naehrig, and Stebila proposed an
instantiation of Peikert's ring-learning-with-errors–based (Ring-LWE) key exchange protocol …
instantiation of Peikert's ring-learning-with-errors–based (Ring-LWE) key exchange protocol …
Oblivious key-value stores and amplification for private set intersection
Many recent private set intersection (PSI) protocols encode input sets as polynomials. We
consider the more general notion of an oblivious key-value store (OKVS), which is a data …
consider the more general notion of an oblivious key-value store (OKVS), which is a data …
Frodo: Take off the ring! practical, quantum-secure key exchange from LWE
Lattice-based cryptography offers some of the most attractive primitives believed to be
resistant to quantum computers. Following increasing interest from both companies and …
resistant to quantum computers. Following increasing interest from both companies and …
New directions in nearest neighbor searching with applications to lattice sieving
To solve the approximate nearest neighbor search problem (NNS) on the sphere, we
propose a method using locality-sensitive filters (LSF), with the property that nearby vectors …
propose a method using locality-sensitive filters (LSF), with the property that nearby vectors …
Estimate all the {LWE, NTRU} schemes!
We consider all LWE-and NTRU-based encryption, key encapsulation, and digital signature
schemes proposed for standardisation as part of the Post-Quantum Cryptography process …
schemes proposed for standardisation as part of the Post-Quantum Cryptography process …
State-of-the-art survey of quantum cryptography
A Kumar, S Garhwal - Archives of Computational Methods in Engineering, 2021 - Springer
In today Internet era, confidential information transmitted over an insecure channel. With the
significant development in the area of quantum computing, there is a need for unconditional …
significant development in the area of quantum computing, there is a need for unconditional …