搜索历史记录选项已关闭,请开启搜索历史记录选项。
作者: Vadim Lyubashevsky
DOI: 10.1007/978-3-642-10366-7_35
关键词:
摘要: … The security of our identification scheme is based on the hardness of finding the approximate shortest vector to within a factor of O(n 2 ) in the standard model, while the security of the …
international conference on the theory and application of cryptology and information security,2013, 引用: 169
theory and application of cryptographic techniques,2013, 引用: 226
Advances in Cryptology – CRYPTO 2014,2014, 引用: 124
Annual Cryptology Conference,2013, 引用: 66
the cryptographers’ track at the rsa conference,2014, 引用: 207
International Workshop on Post-Quantum Cryptography,2014, 引用: 15
cryptographic hardware and embedded systems,2014, 引用: 84
international conference on cryptology in africa,2013, 引用: 29
Advances in Cryptology – EUROCRYPT 2012,2012, 引用: 373
UNITEXT,2012, 引用: 0