Completion requirements
View
This is a book resource with multiple pages. Navigate between the pages using the
buttons.

Introduction
On the structure of this paper
The remainder of this paper is organized as follows: In Section 2, we describe our construction
and the optimizations it uses, and show how to estimate its costs. We then proceed in Section 3 to
describe how existing widely deployed cryptosystems are impacted by our work. In Section 4, we
present several ideas and possible optimizations that we believe are worth exploring in the future.
Finally, we summarize our contributions and their implications in Section 5.