Inviting an author to review:
Find an author and click ‘Invite to review selected article’ near their name.
Search for authorsSearch for similar articles
0
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Security Protocols : 7th International Workshop, Cambridge, UK, April 19-21, 1999. Proceedings 

      Direct CCA-Secure KEM and Deterministic PKE from Plain LWE

      other
      ,
      Springer International Publishing

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references20

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          Trapdoors for hard lattices and new cryptographic constructions

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            On lattices, learning with errors, random linear codes, and cryptography

            Oded Regev (2005)
              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data

                Bookmark

                Author and book information

                Book Chapter
                2019
                July 14 2019
                : 116-130
                10.1007/978-3-030-25510-7_7
                f0f234ea-e01b-4292-a7a3-abe16e5ba79b
                History

                Comments

                Comment on this book

                Book chapters

                Similar content5,051