Abstract. We consider public key encryption based on the learning with errors problem (LWE). There are several reasons why this encryption scheme is not considered to be practical, and one of the most commonly cited is the size of the public key. However, there is a simple way to greatly reduce the size of the public key. The aim of this paper is to investigate such ideas and to consider some ways to implement LWE encryption on devices with relatively small storage. We remark that a more natural approach for such settings would be to use NTRU or Ring-LWE; we also apply our ideas to these cases. Some of the variants we propose no longer have the same rigorous security guarantees enjoyed by standard en-cryption based on LWE. Hence, the bulk o...
International audienceWe show that the Learning with Errors (LWE) problem is classically at least as...
In this lecture the LWE and ring-LWE problems were introduced, and it was described how these can be...
International audienceIn this paper, we investigate the security of the Learning With Error (LWE) pr...
Since its proposal by Regev in 2005, the Learning With Errors (LWE) problem was used as the underlyi...
We use the learning with errors (LWE) problem to build a new simple and provably secure key exchange...
Abstract. The Learning with Errors (LWE) problem has become a central building block of modern crypt...
International audienceThe "learning with errors" (LWE) problem is to distinguish random linear equat...
We use the learning with errors (LWE) problem to build a new simple and provably secure key exchange...
The main focus of this Ph.D thesis lies on the computational problem Learning With Errors (LWE). It ...
International audienceThe Module Learning With Errors (M-LWE) problem is a core computational assump...
Abstract. The Learning with Errors (LWE) problem has gained a lot of attention in recent years leadi...
Lattice-based cryptography relies in great parts on the use of the Learning With Errors (LWE) proble...
The (decisional) learning with errors problem (LWE) asks to distinguish "noisy" inner prod...
The Learning with Errors (LWE) problem is the fundamental backbone of modern lattice-based cryptogra...
International audienceSeveral recent proposals of efficient public-key encryption are based on varia...
International audienceWe show that the Learning with Errors (LWE) problem is classically at least as...
In this lecture the LWE and ring-LWE problems were introduced, and it was described how these can be...
International audienceIn this paper, we investigate the security of the Learning With Error (LWE) pr...
Since its proposal by Regev in 2005, the Learning With Errors (LWE) problem was used as the underlyi...
We use the learning with errors (LWE) problem to build a new simple and provably secure key exchange...
Abstract. The Learning with Errors (LWE) problem has become a central building block of modern crypt...
International audienceThe "learning with errors" (LWE) problem is to distinguish random linear equat...
We use the learning with errors (LWE) problem to build a new simple and provably secure key exchange...
The main focus of this Ph.D thesis lies on the computational problem Learning With Errors (LWE). It ...
International audienceThe Module Learning With Errors (M-LWE) problem is a core computational assump...
Abstract. The Learning with Errors (LWE) problem has gained a lot of attention in recent years leadi...
Lattice-based cryptography relies in great parts on the use of the Learning With Errors (LWE) proble...
The (decisional) learning with errors problem (LWE) asks to distinguish "noisy" inner prod...
The Learning with Errors (LWE) problem is the fundamental backbone of modern lattice-based cryptogra...
International audienceSeveral recent proposals of efficient public-key encryption are based on varia...
International audienceWe show that the Learning with Errors (LWE) problem is classically at least as...
In this lecture the LWE and ring-LWE problems were introduced, and it was described how these can be...
International audienceIn this paper, we investigate the security of the Learning With Error (LWE) pr...