Obfuscating Conjunctions under Entropic Ring LWE

Saved in:
Bibliographic Details
Published inProceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science
Format Conference Proceeding
LanguageEnglish
Published 14.01.2016
Online AccessGet full text
DOI10.1145/2840728.2840764

Cover

BookMark eNotz01LxDAUheEsdKGj69n2D3S8N02aZimlfkBhQJRZhtsklUq9Lf1A5t_LaFfv5nDguRVXPHAUYo9wQFT6QRYKjCwOf83VjYBj066zp6Xjz6Qc-Gtlv3QDz8nKIU5Jxcs0jJ1P3i6D-lTdieuW-jneb92Jj6fqvXxJ6-Pza_lYp5TlxZJqjCADNl55a1CSalEHjF5TNMo2MitQm0BSks4j5BAC2UgGlDXWo43ZTsD_78ojnX-o7904dd80nR2Cu2DchnEbJvsFD3ZDAQ
ContentType Conference Proceeding
DBID ADTOC
UNPAY
DOI 10.1145/2840728.2840764
DatabaseName Unpaywall for CDI: Periodical Content
Unpaywall
Database_xml – sequence: 1
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
ExternalDocumentID 10.1145/2840728.2840764
GroupedDBID ADTOC
UNPAY
ID FETCH-LOGICAL-a368t-51e02d1bc4c9712a4f15d1ec5ae749b238157da22a56e060dda9ea704979c19e3
IEDL.DBID UNPAY
IngestDate Thu Aug 28 11:04:45 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a368t-51e02d1bc4c9712a4f15d1ec5ae749b238157da22a56e060dda9ea704979c19e3
OpenAccessLink https://proxy.k.utb.cz/login?url=http://dl.acm.org/ft_gateway.cfm?id=2840764&type=pdf
ParticipantIDs unpaywall_primary_10_1145_2840728_2840764
PublicationCentury 2000
PublicationDate 2016-01-14
PublicationDateYYYYMMDD 2016-01-14
PublicationDate_xml – month: 01
  year: 2016
  text: 2016-01-14
  day: 14
PublicationDecade 2010
PublicationTitle Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science
PublicationYear 2016
Score 1.8040683
SourceID unpaywall
SourceType Open Access Repository
Title Obfuscating Conjunctions under Entropic Ring LWE
URI http://dl.acm.org/ft_gateway.cfm?id=2840764&type=pdf
UnpaywallVersion publishedVersion
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFA_aHdSLihO_6UEED51Nmo_mKLIxROYQi_NU8inqVstsEf3rTbtuDjzt_hLCS8jv917e7wWAc4ZCFXMqAig0DzClcRArQgPEZBxKJBiXdbXFgPYTfDsioyVR2NhNM6lf8J2v5xkmZSfVe6m7SV3UjS_qdkK5tuugRYlj4B5oJYPh9XPTuQdiclWborjTDNkCG2WWi-8vMR4vwUdvGyRzEc6sauS9Uxayo37-92RcaWU7oP0n2POHCyjaBWsm2wPhvbTlZ5WSy158Z_jmIKw-ZX4lHJv63apIPX9V_kNlcPfUbYOk13286QfNBwmBiGhcBASaEGkoFVacQSSwhURDo4gwDHNZoTFhWiAkCDUhDbUW3AjmggLGFeQm2gde9pGZA-CzyPKYWahl5DgF1pwJAQ2TFamy1IpDcLnwYJrPGmGkM1EzSRtvp40bjlawPQabjoLUSQ2IT4BXTEtz6mC-kGfNrv4CtHynbQ
linkProvider Unpaywall
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFA_aHdSLihO_6UEED51Nmo_mKLIxROYQi_NU8inqVstsEf3rTbtuDjzt_hLCS8jv917e7wWAc4ZCFXMqAig0DzClcRArQgPEZBxKJBiXdbXFgPYTfDsioyVR2NhNM6lf8J2v5xkmZSfVe6m7SV3UjS_qdkK5tuugRYlj4B5oJYPh9XPTuQdiclWborjTDNkCG2WWi-8vMR4vwUdvGyRzEc6sauS9Uxayo37-92RcaWU7oP0n2POHCyjaBWsm2wPhvbTlZ5WSy158Z_jmIKw-ZX4lHJv63apIPX9V_kNlcPfUbYOk13286QfNBwmBiGhcBASaEGkoFVacQSSwhURDo4gwDHNZoTFhWiAkCDUhDbUW3AjmggLGFeQm2gde9pGZA-CzyPKYWahl5DgF1pwJAQ2TFamy1IpDcLnwYJrPGmGkM1EzSRtvp40bjlawPQabjoLUSQ2IT4BXTEtz6mC-kGfNrv4CtHynbQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+of+the+2016+ACM+Conference+on+Innovations+in+Theoretical+Computer+Science&rft.atitle=Obfuscating+Conjunctions+under+Entropic+Ring+LWE&rft.date=2016-01-14&rft_id=info:doi/10.1145%2F2840728.2840764&rft.externalDocID=10.1145%2F2840728.2840764