Simultaneous Hardcore Bits and Cryptography against Memory Attacks, Lecture Notes in Computer Science, vol.5444, pp.474-495, 2009. ,
DOI : 10.1007/978-3-642-00457-5_28
On the complexity of the arora-ge algorithm against lwe, SCC '12: Proceedings of the 3nd International Conference on Symbolic Computation and Cryptography, pp.93-99, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00776434
A generator for LWE and Ring-LWE instances, 2013 ,
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems, Advances in Cryptology ? CRYPTO 2009, pp.595-618, 2009. ,
DOI : 10.1007/978-3-642-03356-8_35
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.2341
New Algorithms for Learning in Presence of Errors, Lecture Notes in Computer Science, vol.6755, pp.403-415, 2011. ,
DOI : 10.1007/978-3-540-85174-5_31
Noise-tolerant learning, the parity problem, and the statistical query model, Journal of the ACM, vol.50, issue.4, pp.506-519, 2003. ,
DOI : 10.1145/792538.792543
Classical hardness of learning with errors, Proceedings of the 45th annual ACM symposium on Symposium on theory of computing, STOC '13, pp.575-584, 2013. ,
DOI : 10.1145/2488608.2488680
URL : https://hal.archives-ouvertes.fr/hal-00922194
Efficient Fully Homomorphic Encryption from (Standard) LWE, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, pp.97-106, 2011. ,
DOI : 10.1109/FOCS.2011.12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6463
BKZ 2.0: Better Lattice Security Estimates, Advances in Cryptology -ASIACRYPT 2011, pp.1-20, 2011. ,
DOI : 10.1007/978-3-642-25385-0_1
URL : https://hal.archives-ouvertes.fr/hal-01109961
Lattice Signatures and Bimodal Gaussians, Lecture Notes in Computer Science, vol.8042, issue.1, pp.40-56, 2013. ,
DOI : 10.1007/978-3-642-40041-4_3
URL : https://hal.archives-ouvertes.fr/hal-00864298
An improved LPN algorithm, Security and Cryptography for Networks, 5th International Conference, pp.348-359, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00563959
Homomorphic Evaluation of the AES Circuit, Advances in Cryptology ? CRYPTO 2012, pp.850-867 ,
DOI : 10.1007/978-3-642-32009-5_49
Robustness of the Learning with Errors assumption, ICS, pp.230-240, 2010. ,
Design and Implementation of a Homomorphic-Encryption Library, 2013. 16 Kashmir Hill. Blueprints of NSA's ridiculously expensive data center in utah suggest it holds less info than thought blueprints-of-nsa-data-center-in-utah-suggest-its-storage-capacity-is-less-impressive-than-thought, 2013. ,
SciPy: Open source scientific tools for Python, 2001. ,
Improved generalized birthday attack. Cryptology ePrint Archive, Report, vol.377, 2011. ,
Better Key Sizes (and Attacks) for LWE-Based Encryption, IACR Cryptology ePrint Archive, vol.66, issue.6, p.592, 2010. ,
DOI : 10.1007/3-540-45708-9_19
Solving BDD by Enumeration: An Update, Topics in Cryptology -CT-RSA 2013, pp.293-309, 2013. ,
DOI : 10.1007/978-3-642-36095-4_19
URL : https://hal.archives-ouvertes.fr/hal-00864361
Lattice-based cryptography, Post-Quantum Cryptography, pp.147-191, 2009. ,
User Guide for MINPACK-1, 1980. ,
Subspace LWE, Lecture Notes in Computer Science, vol.7194, pp.548-563, 2012. ,
DOI : 10.1007/978-3-642-28914-9_31
On lattices, learning with errors, random linear codes, and cryptography, J. ACM, vol.56, issue.6, 2009. ,
The Sage Development Team, Sage Mathematics Software, 2013. ,
Estimating Key Sizes for High Dimensional Lattice-Based Systems, Cryptology ePrint Archive, vol.630, 2013. ,
DOI : 10.1007/978-3-642-45239-0_17