共 50 条
- [32] DArL: Dynamic Parameter Adjustment for LWE-based Secure Inference 2019 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2019, : 1739 - 1744
- [33] Exploring the Vulnerability of R-LWE Encryption to Fault Attacks PROCEEDINGS OF THE FIFTH WORKSHOP ON CRYPTOGRAPHY AND SECURITY IN COMPUTING SYSTEMS (CS2 2018), 2016, : 7 - 12
- [34] Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs-Parallel PC Oracle Attacks on Kyber KEM and Beyond IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (02): : 418 - 446
- [35] A LWE-based oblivious transfer protocol from indistinguishability obfuscation International Journal of Network Security, 2020, 22 (05): : 801 - 808
- [36] Sender-side Public Key Deniable Encryption Scheme Based on LWE Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2020, 52 (02): : 192 - 199
- [38] Public key encryption and encryption emulation attacks COMPUTER SCIENCE - THEORY AND APPLICATIONS, 2008, 5010 : 252 - 260
- [40] CCA Secure Public Key Encryption Scheme Based on LWE Without Gaussian Sampling INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 361 - 378