dc.contributor.author | Bonte, Charlotte | |
dc.contributor.author | Iliashenko, Ilia | |
dc.contributor.author | Park, Jeongeun | |
dc.contributor.author | Pereira, Hilder V. L. | |
dc.contributor.author | Smart, Nigel P. | |
dc.date.accessioned | 2023-05-30T07:48:21Z | |
dc.date.available | 2023-04-29T04:11:34Z | |
dc.date.available | 2023-05-30T07:48:21Z | |
dc.date.issued | 2022 | |
dc.identifier.isbn | 978-3-031-22965-7 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.other | WOS:000964575000007 | |
dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/41503.2 | |
dc.source | WOS | |
dc.title | FINAL: Faster FHE Instantiated with NTRU and LWE | |
dc.type | Proceedings paper | |
dc.identifier.doi | 10.1007/978-3-031-22966-4_7 | |
dc.identifier.eisbn | 978-3-031-22966-4 | |
dc.source.numberofpages | 28 | |
dc.source.peerreview | yes | |
dc.source.beginpage | 188 | |
dc.source.endpage | 215 | |
dc.source.conference | 28th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT) | |
dc.source.conferencedate | DEC 05-09, 2022 | |
dc.source.conferencelocation | Taipei | |
dc.source.journal | Lecture Notes in Computer Science | |
dc.source.volume | 13792 | |
imec.availability | Published - imec | |
dc.description.wosFundingText | We would like to thank Leo Ducas for helpful discussions about the security of the NTRU problem. | |
dc.description.wosFundingText | This work has been supported in part by ERC Advanced Grant ERC-2015-AdG-IMPaCT, by the Research Foundation -Flanders (FWO) under an Odysseus project GOH9718N and a Junior Postdoctoral Fellowship, by CyberSecurity Research Flanders with reference number VR20192203, and by the Defence Advanced Research Projects Agency (DARPA) under contract No. HR0011-21-C-0034 DARPA DPRIVE BASALISC. | |
dc.description.wosFundingText | Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the ERC, DARPA, the US Government, Cyber Security Research Flanders or the FWO. The U.S. Government is authorized to reproduce and distribute reprints for governmental purposes notwithstanding any copyright annotation therein. | |