Search

Your search keyword '"ring-lwe"' showing total 50 results

Search Constraints

Start Over You searched for: Descriptor "ring-lwe" Remove constraint Descriptor: "ring-lwe" Search Limiters Full Text Remove constraint Search Limiters: Full Text
50 results on '"ring-lwe"'

Search Results

1. Quantum Security of a Compact Multi-Signature.

2. On Advances of Lattice-Based Cryptographic Schemes and Their Implementations.

3. Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing.

4. Towards a Ring Analogue of the Leftover Hash Lemma

5. Discretisation and Product Distributions in Ring-LWE

6. (In)Security of Ring-LWE Under Partial Key Exposure

7. CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes

8. LWE from non-commutative group rings.

9. FPGA-Based Hardware Accelerator for Leveled Ring-LWE Fully Homomorphic Encryption

10. An efficient full dynamic group signature scheme over ring

11. Identity-Based Proxy Re-encryption over NTRU Lattices for Cloud Computing.

12. High-Secure Fingerprint Authentication System Using Ring-LWE Cryptography

13. Towards a Ring Analogue of the Leftover Hash Lemma.

14. (In)Security of Ring-LWE Under Partial Key Exposure.

15. Discretisation and Product Distributions in Ring-LWE.

16. Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols

17. VPQC: A Domain-Specific Vector Processor for Post-Quantum Cryptography Based on RISC-V Architecture.

18. Post-Quantum Lattice-Based Cryptography Implementations: A Survey.

19. A New Ring-Based SPHF and PAKE Protocol on Ideal Lattices.

20. HEPCloud: An FPGA-Based Multicore Processor for FV Somewhat Homomorphic Function Evaluation.

21. IoT application protection against power analysis attack.

22. A Resource-Efficient and Side-Channel Secure Hardware Implementation of Ring-LWE Cryptographic Processor.

23. Practical CCA2-Secure and Masked Ring-LWE Implementation

24. A novel combined correlation power analysis (CPA) attack on schoolbook polynomial multiplication in lattice-based cryptosystems

25. Tree-Based Ring-LWE Group Key Exchanges with Logarithmic Complexity

26. Towards a Ring Analogue of the Leftover Hash Lemma

27. Homomorphic AES evaluation using the modified LTV scheme.

28. FPGA-Based Hardware Accelerator for Leveled Ring-LWE Fully Homomorphic Encryption

29. High Efficiency Ring-LWE Cryptoprocessor Using Shared Arithmetic Components

30. CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes

31. Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols

32. High-Speed Polynomial Multiplication Architecture for Ring-LWE and SHE Cryptosystems.

34. High Efficiency Ring-LWE Cryptoprocessor Using Shared Arithmetic Components.

35. NTRU prime: reducing attack surface at low cost

36. Post-quantum key exchange - a new hope

38. Post-Quantum Key Exchange -- A new hope

39. An efficient full dynamic group signature scheme over ring.

40. FHEW: Bootstrapping Homomorphic Encryption in less than a second

41. Post-Quantum Key Exchange -- A new hope

42. FHEW: Bootstrapping Homomorphic Encryption in less than a second

43. Post-kvantová kryptografie na omezených zařízeních

44. Post-kvantová kryptografie na omezených zařízeních

45. Post-kvantová kryptografie na omezených zařízeních

46. Post-kvantová kryptografie na omezených zařízeních

47. Post-kvantová kryptografie na omezených zařízeních

48. Post-kvantová kryptografie na omezených zařízeních

49. Tree-Based Ring-LWE Group Key Exchanges with Logarithmic Complexity

50. Tree-Based Ring-LWE Group Key Exchanges with Logarithmic Complexity

Catalog

Books, media, physical & digital resources