Filters








552 Hits in 2.1 sec

Multi-power Post-quantum RSA [article]

John M. Schanck
2018 IACR Cryptology ePrint Archive  
1 , f (xR) m−1 (xR), f (xR) m−1 (xR) 2 , . . . , f (xR) m−1 (xR) k−1            .  ...  The resulting cost is (lg n) • M(lg n) bit operations plus (lg S) • M(lg n) qubit operations where S = n 2L/E .  ... 
dblp:journals/iacr/Schanck18 fatcat:shwcvcvsnnbclpnftifp2wunti

A Comparison of NTRU Variants [article]

John M. Schanck
2018 IACR Cryptology ePrint Archive  
We will refer to the variant of ntru that was proposed by Hülsing, Rijnveld, Schanck, and Schwabe [9] as ntru-hrss.  ...  The inequality ( 3 ) holds for all f ∈ L f , g ∈ L g , r ∈ L r , and m ∈ L m ; and 3. For all m ∈ L m we have m = m mod (p, Φ n ).  ... 
dblp:journals/iacr/Schanck18a fatcat:agv4m2mhuvbalbetx7hlhwbfhi

Choosing Parameters for NTRUEncrypt [chapter]

Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang
2017 Lecture Notes in Computer Science  
Such a failure is roughly as expensive as a full encryption, so d m should be chosen to ensure that failures are rare. Let I(d m ) = {(i, j) : d m ≤ i < (N − 2d m ), d m ≤ j < (N − d m − i)}.  ...  Let M be the subset of T N satisfying the d m constraint.  ... 
doi:10.1007/978-3-319-52153-4_1 fatcat:mkfd36bhebbkrosxklwpthtggm

An upper bound on the decryption failure rate of static-key NewHope [article]

John M. Schanck
2020 IACR Cryptology ePrint Archive  
as m i=1 u i v i .  ...  As observed by Song, Lee, Lee, Shin, Kim, and No [6] , if u 1 , . . . u m and v 1 , . . . , v m are random variables with the NewHope coefficient distribution, and v 2 , . . . , v m are m × 1 vectors  ... 
dblp:journals/iacr/Schanck20 fatcat:cdgjhlowq5g33bwu5judb2hqgm

Quantum speedups for lattice sieves are tenuous at best [article]

Martin R. Albrecht, Vlad Gheorghiu, Eamonn W. Postlethwaite, John M. Schanck
2019 IACR Cryptology ePrint Archive  
For some m ≥ 3 the m bit Toffoli gate is T OF m : {0, 1} m → {0, 1} m , (x 1 , . . . , x m−1 , x m ) → (x 1 , . . . , x m−1 , (x 1 ∧ • • • ∧ x m−1 ) ⊕ x m ).  ...  It follows that q x (m) < (c + 1)/m + (2c + 1) arcsin( √ x)/2mθ. Note that 2mθ > (2m − 1)θ > cπ − arcsin( √ x) and (c + 1)/m < 2θ/π + 1/m.  ... 
dblp:journals/iacr/AlbrechtGPS19 fatcat:ym6eef4hlnguvlx25zgzn7e7t4

Transcript Secure Signatures Based on Modular Lattices [chapter]

Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte
2014 Lecture Notes in Computer Science  
Silverman, Mathematics Department, Box 1917, Brown University, Providence, RI 02912 USA John M.  ...  Schanck/William Whyte, Security Innovation, Wilmington, MA 01887 E-mail address: jhoff@math.brown.edu, jpipher@math.brown.edu, jhs@math.brown.edu, jschanck@securityinnovation.com, wwhyte@securityinnovation.com  ... 
doi:10.1007/978-3-319-11659-4_9 fatcat:64curwbcnvbdddc6s4zsxyy5fy

Practical Signatures from the Partial Fourier Recovery Problem [chapter]

Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte
2014 Lecture Notes in Computer Science  
JEFF HOFFSTEIN, JILL PIPHER, JOHN SCHANCK, JOSEPH H. SILVERMAN, AND WILLIAM WHYTE JEFF HOFFSTEIN, JILL PIPHER, JOHN SCHANCK, JOSEPH H.  ...  SILVERMAN, AND WILLIAM WHYTE JEFF HOFFSTEIN, JILL PIPHER, JOHN SCHANCK, JOSEPH H. SILVERMAN, AND WILLIAM WHYTE JEFF HOFFSTEIN, JILL PIPHER, JOHN SCHANCK, JOSEPH H.  ... 
doi:10.1007/978-3-319-07536-5_28 fatcat:ubnquz6qcbd27ffc6pc44alxyi

Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world

John M. Schanck, William Whyte, Zhenfei Zhang
2016 Proceedings on Privacy Enhancing Technologies  
It receives a public key epk from the challenger, samples m 0 and m 1 uniformly from M k , and then requests an IND-CPA challenge for m 0 and m 1 .  ...  . • Send(π s i , m) → m . Causes the oracle π s i to execute the next routine of its handshake protocol with input m.  ... 
doi:10.1515/popets-2016-0037 dblp:journals/popets/SchanckWZ16 fatcat:eylhs2de3nbbhguptw5te376he

CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM

Joppe Bos, Leo Ducas, Eike Kiltz, T Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, Damien Stehle
2018 2018 IEEE European Symposium on Security and Privacy (EuroS&P)  
Define m ′ = Compress q (v − s T u, 1) . We then know that ⌈q/4⌋ ≥ ∥v − s T u − ⌈q/2⌋ · m ′ ∥ ∞ = ∥w + ⌈q/2⌋ · m − ⌈q/2⌋ · m ′ ∥ ∞ .  ...  m where ∥w ∥ ∞ < ⌈q/4⌋.  ...  Algorithm 6 Kyber.Hybrid.KeyGen() 1: (pk (ρ, t), sk (s, ρ, t)) ← Kyber.KeyGen() 2: return (pk, sk) Algorithm 7 Kyber.Hybrid.Enc(pk = (ρ, t),m)  ... 
doi:10.1109/eurosp.2018.00032 dblp:conf/eurosp/BosDKLLSSSS18 fatcat:o7dl5wpwcndarjp3wtm2eqwycm

Page 19 of The Banking Law Journal Vol. 1, Issue 1 [page]

1889 The Banking Law Journal  
J., which note is indorsed, first, by Samuel M. Schanck; second, by Samuel M. Schanck, Treas.; third, by myself; and, /astly, by said Charles V.  ...  ‘There were on the note two indorsers before Bab- bitt, one of whom was Samuel M. Schanck. Moore, having paid the note, commenced suit therefor against all the indorsers, including Babbitt.  ... 

Page 166 of American Society of Civil Engineers. Proceedings of the American Society of Civil Engineers Vol. 76-80, Issue Index [page]

1950 American Society of Civil Engineers. Proceedings of the American Society of Civil Engineers  
Saffir “Wind Loads on Truss Bridges” (201) by John M. Biggs “Wind Velocities During Hurricanes” (218) by Robert C.  ...  Dsc (367) of “Aeronautical Charting and Map- ping” (172) See Schanck, Charles A. Dsc (367) of “Topographic Mapping in Kentucky” (151) See Miles, Phil M.  ... 

Page 204 of The Merchant's Magazine and Commercial Review Vol. 17, Issue 2 [page]

1847 The Merchant's Magazine and Commercial Review  
M. Demill. Pollen & Colgate. S. N. Dodge. Alfred Schanck. Samuel Schoonmaker. Francis Butler. B. & 8. Jesup. Lawrence & Keese. James W, H. Bell. W. Williams. J. & J. F. Trippe. John Randall. W.  ...  Charles M. Terry. R. M. Blackwell & Co. Woodhull & Minturn. P. & H. Van Nest. D. C. Freeman. N. L. M’Cready & Co. De Peyster & Whitmarsh. Barnard, Curtiss & Co. John W. Whitlock. Williams & Hinman.  ... 

Page 711 of Psychological Bulletin Vol. 28, Issue 9 [page]

1931 Psychological Bulletin  
JosEPHINE BALL, Johns Hopkins Hospital. An Analysis of the Effect of Doors in the Maze. J. F. Dasurett, University of North Carolina. The Effect of Continuous Rotation on the Albino Rat. Roy M.  ...  M. F. Martin, West Springfield, Mass. Color Preference: A Study of Race, Age, Hue, Chroma, and Value Factors. W. R. Atkinson, Southwestern College. Parental Attitudes. Ratpn M.  ... 

Page 711 of Psychological Bulletin Vol. 28, Issue 9 [page]

1931 Psychological Bulletin  
JosePHINE Batt, Johns Hopkins Hospital. An Analysis of the Effect of Doors in the Maze. J. F. DasuHtett, University of North Carolina. The Effect of Continuous Rotation on the Albino Rat. Roy M.  ...  M. F. Martin, West Springfield, Mass. Color Preference: A Study of Race, Age, Hue, Chroma, and Value Factors. W. R. Atxtnson, Southwestern College. Parental Attitudes. Ratepn M.  ... 

Page 267 of The American Journal of the Medical Sciences Vol. 6, Issue 11 [page]

1843 The American Journal of the Medical Sciences  
M. Pearson, Richmond N. Penniman, Jesse A. Pepper, Lawrence S. Pope, Juhn T. Race, Henry Raines, William N. Reynolds, Thomas Rickards, William M. L. Rogers, John C.  ...  Schanck, John S. Shivers, James K. Simmons, Edward L. Singleton. Spyers Slemmer, Henry T. Stabler, Richard H. Stock well, Nathaniel Stribling, Magnus W. American Intelligence.  ... 
« Previous Showing results 1 — 15 out of 552 results