Login / Signup
Factoring and Pairings Are Not Necessary for IO: Circular-Secure LWE Suffices.
Zvika Brakerski
Nico Döttling
Sanjam Garg
Giulio Malavolta
Published in:
ICALP (2022)
Keyphrases
</>
highly efficient
hough transform
security issues
operating system
covert channel
identity management
lightweight
key management
security analysis
security mechanisms
microstrip antenna
harmonic functions
authentication protocol
standard model
data sets
sensitive data
web services