Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Lattice problem
Applied sciences
Computer engineering
Computer security
Post-quantum cryptography
Graph Chatbot
Related lectures (17)
Login to filter by course
Login to filter by course
Reset
Voronoi Analysis: Closest Vector Problem
Explores Voronoi analysis for efficient Closest Vector Problem solutions.
LLL Algorithm
Covers the LLL algorithm for lattice reduction and discusses Hermite's constant and Minkowski's theorem.
Closest Vector Problem: Voronoi Cells
Explores the Closest Vector Problem and Voronoi cells in lattice reduction algorithms.
Subset Sum: LLL Algorithm
Covers the Subset Sum problem and the efficient LLL algorithm for finding solutions in lattice basis reduction.
Homomorphic Encryption
Introduces homomorphic encryption, enabling computation on encrypted data without decryption, covering security, applications, and practical aspects.
Homomorphic Encryption: BGV Cryptosystem
Delves into the BGV cryptosystem, covering security, correctness, noise management, and practical considerations in homomorphic encryption.
SecChisel: Security Verification of Secure Processor Architectures
Presents the SecChisel framework for verifying security properties of secure processor architectures at design-time.
Asymmetric Cryptography: Basics and Applications
Explores asymmetric cryptography basics, including encryption, signatures, and Diffie-Hellman, along with advanced topics like RSA and quantum computing implications.
Homomorphic Encryption
Covers the historical development and key concepts of homomorphic encryption, focusing on the Paillier cryptosystem and the BGV cryptosystem.
Elliptic Curve Cryptography: Galois Fields
Explores Galois fields, elliptic curve cryptography, arithmetic operations, group structure, and practical examples in cryptography.
Postquantum TLS: Key Exchange and Authentication
Explores Post-Quantum TLS implementation without handshake signatures, focusing on key exchange and authentication using KEM.
Public-Key Cryptography: Post-Quantum and Access Control
Explores public-key cryptography, post-quantum systems, and access control mechanisms in depth.
Cryptographic Primitives: Theory and Practice
Explores fundamental cryptographic primitives, security models, and the relationship between decryption security and key recovery security.
Asymmetric Cryptography: RSA, Elliptic Curves, Lattices
Explores RSA, elliptic curves, and lattice-based cryptography for secure communication.
Untitled
Untitled
Local Fields and Correlations in Ising Models
Covers local fields and correlations in Ising models and conformal field theory.
Previous
Page 1 of 1
Next