Several well-known public key encryption schemes, including those of Alekhnovich (FOCS 2003), Regev (STOC 2005), and Gentry, Peikert and Vaikuntanathan (STOC 2008), rely on the conjectured intractability of inverting noisy linear encodings. These schemes are limited in that they either require the underlying field to grow with the security parameter, or alternatively they can work over the binary field but have a low noise entropy that gives rise to sub-exponential attacks. Motivated by the goal of efficient public key cryptography, we study the possibility of obtaining encryption scheme of Micciancio (PKC 2010), we consider an abstract encryption scheme that unifies all the three schemes mentioned above and allows for arbitrary choices of ...
Since the appearance of public-key cryptography in Diffie-Hellman seminal paper, many schemes have b...
AbstractAt INDOCRYPT 2003 Abisha, Thomas, and Subramanian proposed two public key schemes based on w...
Modeling efficient algorithms as polynomial size circuits rather than as polynomial time Turing mach...
Several well-known public key encryption schemes, including those of Alekhnovich (FOCS 2003), Regev ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
International audienceWe formally treat cryptographic constructions based on the hardness of decidin...
We study the design of cryptographic primitives resistant to a large class of side-channel attacks, ...
This paper considers - for the first time - the concept of key alternating ciphers in a provable sec...
In the first part of the thesis we show black-box separations in public and private-key cryptography...
Public-key encryption enables secure communication over an insecure network. In this thesis, we disc...
Part I: Theory Provable security is an important goal in the design of public-key cryptosystems. For...
Incompressibility is a popular security notion for white-box cryptography and captures that a large ...
The Learning Parity with Noise (LPN) problem has recently found many applications in cryptography as...
A large part in the design of secure cryptographic primitives consists in identifying hard algorithm...
We examine new ways in which coding theory and cryptography continue to be composed together, and sh...
Since the appearance of public-key cryptography in Diffie-Hellman seminal paper, many schemes have b...
AbstractAt INDOCRYPT 2003 Abisha, Thomas, and Subramanian proposed two public key schemes based on w...
Modeling efficient algorithms as polynomial size circuits rather than as polynomial time Turing mach...
Several well-known public key encryption schemes, including those of Alekhnovich (FOCS 2003), Regev ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
International audienceWe formally treat cryptographic constructions based on the hardness of decidin...
We study the design of cryptographic primitives resistant to a large class of side-channel attacks, ...
This paper considers - for the first time - the concept of key alternating ciphers in a provable sec...
In the first part of the thesis we show black-box separations in public and private-key cryptography...
Public-key encryption enables secure communication over an insecure network. In this thesis, we disc...
Part I: Theory Provable security is an important goal in the design of public-key cryptosystems. For...
Incompressibility is a popular security notion for white-box cryptography and captures that a large ...
The Learning Parity with Noise (LPN) problem has recently found many applications in cryptography as...
A large part in the design of secure cryptographic primitives consists in identifying hard algorithm...
We examine new ways in which coding theory and cryptography continue to be composed together, and sh...
Since the appearance of public-key cryptography in Diffie-Hellman seminal paper, many schemes have b...
AbstractAt INDOCRYPT 2003 Abisha, Thomas, and Subramanian proposed two public key schemes based on w...
Modeling efficient algorithms as polynomial size circuits rather than as polynomial time Turing mach...