Classical Reduction of SVP to LWE: A Concrete Security Analysis.
Palash SarkarSubhadip SinghaPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- security analysis
- smart card
- security requirements
- public key
- high security
- security model
- security properties
- encryption scheme
- authentication protocol
- encryption algorithm
- image encryption
- authentication scheme
- user authentication
- proxy signature scheme
- private key
- database systems
- distributed environment
- data mining
- real time