Autor der Publikation

On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.

, , , und . IACR Cryptology ePrint Archive, (2016)

Bitte wählen Sie eine Person um die Publikation zuzuordnen

Um zwischen Personen mit demselben Namen zu unterscheiden, wird der akademische Grad und der Titel einer wichtigen Publikation angezeigt. Zudem lassen sich über den Button neben dem Namen einige der Person bereits zugeordnete Publikationen anzeigen.

Florian Jaensch University of Stuttgart

Complex Physics with Graph Networks for Industrial Material Flow Simulation, , , , , und . 16th CIRP Conference on Intelligent Computation in Manufacturing Engineering, 118, Seite 50-55. Elsevier, (2023)

Florian Frick University of Stuttgart

Software-Defined Control Cabinet : Reprogramming Instead of Replacing, , , und . Production at the Leading Edge of Technology : Proceedings of the 13th Congress of the German Academic Association for Production Technology (WGP), Seite 438-447. Cham, Springer, (2024)
Software-Defined Control Cabinet : Reprogramming Instead of Replacing, , , und . Production at the Leading Edge of Technology : Proceedings of the 13th Congress of the German Academic Association for Production Technology (WGP), Seite 438-447. Cham, Springer, (2024)Endpoint Architecture for Distributed Real-Time Applications Based on TSN, , , , und . 2024 IEEE 20th International Conference on Factory Communication Systems (WFCS), Seite 41-48. (April 2024)Using TSN for Accelerator Control Systems, , , , und . (2023)
 

Weitere Publikationen von Autoren mit dem selben Namen

On the Efficacy of Solving LWE by Reduction to Unique-SVP., , und . ICISC, Volume 8565 von Lecture Notes in Computer Science, Seite 293-310. Springer, (2013)Securely Instantiating Cryptographic Schemes Based on the Learning with Errors Assumption.. Darmstadt University of Technology, Germany, (2016)Provably Secure LWE-Encryption with Uniform Secret., , und . IACR Cryptology ePrint Archive, (2013)High-Speed Signatures from Standard Lattices., , , , , , , und . LATINCRYPT, Volume 8895 von Lecture Notes in Computer Science, Seite 84-103. Springer, (2014)Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge., , , , , , , , und . IACR Cryptology ePrint Archive, (2017)Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge., , , , , , , , und . AsiaPKC@AsiaCCS, Seite 11-20. ACM, (2016)A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE., , und . PQCrypto, Volume 10346 von Lecture Notes in Computer Science, Seite 184-202. Springer, (2017)Discrete Ziggurat: A Time-Memory Trade-Off for Sampling from a Gaussian Distribution over the Integers., , , , und . Selected Areas in Cryptography, Volume 8282 von Lecture Notes in Computer Science, Seite 402-417. Springer, (2013)Learning with Errors in the Exponent., , und . ICISC, Volume 9558 von Lecture Notes in Computer Science, Seite 69-84. Springer, (2015)Provably secure LWE encryption with smallish uniform noise and secret., , und . AsiaPKC@AsiaCCS, Seite 33-42. ACM, (2014)