3:15 (Search) LWE 19:00 Arora-Ge Attack 37:00 Decisional LWE (& proof that it is equivalent to Search LWE) 56:15 Constructing Secret Key Encryption scheme with LWE 1:10:15 Constructing Public Key Encryption scheme with LWE Again, the prof. is doing an outstanding job explaining LWE. It's much easier to understand than merely reading the literature.
Thanks very much for sharing a wonderful lecture! Could you reference the place which gives the proof of sufficiently many calls to oracle would reveal the secret (this is addressed around 15.00)?
3:15 (Search) LWE
19:00 Arora-Ge Attack
37:00 Decisional LWE (& proof that it is equivalent to Search LWE)
56:15 Constructing Secret Key Encryption scheme with LWE
1:10:15 Constructing Public Key Encryption scheme with LWE
Again, the prof. is doing an outstanding job explaining LWE. It's much easier to understand than merely reading the literature.
That's an extremely well explained lecture on LWE. Much appreciated.
Thanks very much for sharing a wonderful lecture! Could you reference the place which gives the proof of sufficiently many calls to oracle would reveal the secret (this is addressed around 15.00)?
@33:15 there was some cropping. May I know if I could see the full video somewhere?
Thank you for the uploads. Helped a lot when reading his BGV paper