Skip to main content
Tour
About Us
Meta
current community
Stack Exchange
chat
Meta Stack Exchange
your communities
Sign up
or
log in
to customize your list.
more stack exchange communities
company blog
Log in
Stack Exchange
All Sites
Top 400 Users
Digests
Chris Peikert
http://www.cc.gatech.edu/~cpeikert/
top
accounts
reputation
activity
subscriptions
Top Questions
49
votes
many parallel applications of a sequential transform in repa
arrays
haskell
functional-programming
sequential
repa
asked Jun 11, 2014 at 0:04
stackoverflow.com
9
votes
reuse/memoization of global polymorphic (class) values in Haskell
haskell
polymorphism
memoization
asked May 18, 2015 at 21:12
stackoverflow.com
8
votes
Efficient Dirichlet approximation (continued fractions?) over a number field
nt.number-theory
algebraic-number-theory
diophantine-approximation
asked Jul 13, 2016 at 18:58
mathoverflow.net
Top Answers
36
Why can't the commitment schemes have both information theoretic hiding and binding properties?
crypto.stackexchange.com
31
What does the work "An Efficient Quantum Algorithm for Lattice Problems Achieving Subexponential Approximation Factor" mean?
crypto.stackexchange.com
20
New quantum attack on lattices (or Shor strikes again)?
crypto.stackexchange.com
20
Entropy of two concatenated random values
crypto.stackexchange.com
18
breaking fully homomorphic encryption schemes
crypto.stackexchange.com
15
Concrete evidence for the asymptotics of $\lambda_1(\Lambda^\perp(A))$?
crypto.stackexchange.com
12
Relation between decisional SIS and leftover hash lemma in lattices
crypto.stackexchange.com
12
Use of q-ary lattices in developing cryptosystems
crypto.stackexchange.com
12
How does the simulator of the special-honest verifier zero-knowledge property works?
crypto.stackexchange.com
11
What asymmetric key exchange algorithms are known besides DH?
crypto.stackexchange.com
10
Peikert's framework for attacks on R-LWE: What "reduction modulo q" means?
crypto.stackexchange.com
10
What is scale-invariance notion of a fully homomorphic encryption scheme?
crypto.stackexchange.com
10
AES-ECB as an authentication mechanism
crypto.stackexchange.com
9
Universal Circuits in Indistinguishability Obfuscation Candidate Construction
crypto.stackexchange.com
8
Subverting the key generation step in RSA public key cryptography
crypto.stackexchange.com
7
How to generate new LWE samples
crypto.stackexchange.com
7
Hitting a counter example in homomorphic encryption over the integers
crypto.stackexchange.com
7
Encryption-Decryption-Encryption
crypto.stackexchange.com
7
Can the Smart-Vercauteren Homomorphic Encryption be implemented as a practical fully homomorphic encryption scheme?
crypto.stackexchange.com
7
Multiple NTRU public keys for the same private key?
crypto.stackexchange.com
7
Find collision in Ajtai's hash function using short vector
crypto.stackexchange.com
7
Collisions in the cyclotomic knapsack function
crypto.stackexchange.com
7
Can we give access to controlled functionality in Fully homomorphic encryption schemes?
crypto.stackexchange.com
7
CPA-security of CTR mode
crypto.stackexchange.com
7
Diffie-Hellman when $p$ and $g$ are pre-agreed and hidden from Eve
crypto.stackexchange.com
7
A problem about Gaussian distribution in paper GPV08
crypto.stackexchange.com
7
Ring-LWE in other fields
crypto.stackexchange.com
6
What is the difference between the standard representants of $\mathbb Z/q\mathbb Z$?
crypto.stackexchange.com
6
Ring-LWE elliptic gaussian distribution
crypto.stackexchange.com
6
Randomness re-use in LWE encryption scheme
crypto.stackexchange.com
1
2
next