summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorBryan Bishop <kanzure@gmail.com>2016-09-04 23:26:22 -0500
committerBryan Bishop <kanzure@gmail.com>2016-09-04 23:26:22 -0500
commit1439e91474fbdce24e6b1da176534b3f8613b0c1 (patch)
tree5a0bad913af94d61a6eaf1e617b2bf39b0d431a5
parent72853cdb40c2c850d4bfe81be2e4caedd165a175 (diff)
downloaddiyhpluswiki-1439e91474fbdce24e6b1da176534b3f8613b0c1.tar.gz
diyhpluswiki-1439e91474fbdce24e6b1da176534b3f8613b0c1.zip
link to two more papers
-rw-r--r--transcripts/simons-institute/history-of-lattice-based-cryptography.mdwn4
1 files changed, 2 insertions, 2 deletions
diff --git a/transcripts/simons-institute/history-of-lattice-based-cryptography.mdwn b/transcripts/simons-institute/history-of-lattice-based-cryptography.mdwn
index 6bf11d1..1e990f7 100644
--- a/transcripts/simons-institute/history-of-lattice-based-cryptography.mdwn
+++ b/transcripts/simons-institute/history-of-lattice-based-cryptography.mdwn
@@ -212,9 +212,9 @@ A: ... proof works for every n. There is the worst case side and then there's th
But anyway, moving on, an important point is that it's sort of not quite understood at the time, this proof was not just a scale-downed version of Ajtai's function. I think that's what people had an impression of. I figured it was just a conference and it was rejected and I figured fine. But after a review after submitting to a journal, I got a one line rejection and that's when I knew hey wait something is up... the reviewer said hey this paper is using a new assumption, what would happen if the assumption gets broken, hey that would ruin the reputation of the journal (laughter).
-Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices, Peikert-Rosen 2006
+[Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices, Peikert-Rosen 2006](https://web.eecs.umich.edu/~cpeikert/pubs/cyclic-crh.pdf)
-Generalized compact knapsacks are collision resistant, Lyubashevsky-Micciancio 2006
+[Generalized compact knapsacks are collision resistant, Lyubashevsky-Micciancio 2006](https://cseweb.ucsd.edu/~daniele/papers/IdealHash.pdf)
But if you think about the kind of assumptions used in the past few years, we get multilinear maps and obfuscation..