We first propose an authenticated key exchange (AKE) from the LWE problem. The AKE is simple since it does not involve any other cryptographic primitives to achieve authentication and depends on solely the LWE problem in the worst-case (e.g., SVP and SIVP). We give its security under the BR model, which captures wPFS and might be appealing in specific applications.
from #AlexandrosSfakianakis via Alexandros G.Sfakianakis on Inoreader http://ift.tt/2oTti7B
via IFTTT
Εγγραφή σε:
Σχόλια ανάρτησης (Atom)
Δημοφιλείς αναρτήσεις
-
Objective Outpatient parenteral antimicrobial therapy (OPAT) provides opportunities for improved cost savings, but in the UK, implementation...
-
Abstract Purpose Overcoming the flaws of current data management conditions in head and neck oncology could enable integrated informatio...
-
Universal newborn hearing screening (UNHS) has become the standard of care in many countries. The aim of this study was to evaluate the resu...
-
Geographic region: Does it matter in cutaneous melanoma of the head and neck? Laryngoscope. 2017 Jun 05;: Authors: Kılıç S, Unsal AA,...
-
The overall objective of the guideline is to provide up-to-date, evidence-based recommendations for the management of lichen sclerosus (LS)...
-
Abstract The head-mounted display (HMD) has the potential to improve the quality of ultrasound-guided procedures. The aim of this non-clin...
-
http://ift.tt/2pnwWaQ
-
Objective. We compared the effects of transcranial direct current stimulation at different cortical sites (premotor and motor primary cortex...
-
ACS Nano DOI: 10.1021/acsnano.7b01926 from #AlexandrosSfakianakis via Alexandros G.Sfakianakis on Inoreader http://ift.tt/2pOw4te via...
Δεν υπάρχουν σχόλια:
Δημοσίευση σχολίου