Search

Your search keyword '"Lattice-based cryptography"' showing total 431 results

Search Constraints

Start Over You searched for: Descriptor "Lattice-based cryptography" Remove constraint Descriptor: "Lattice-based cryptography" Topic computer science Remove constraint Topic: computer science
431 results on '"Lattice-based cryptography"'

Search Results

1. The Design of Efficient and Secure Lattice-based (FH)E

2. Revisiting Higher-Order Masked Comparison for Lattice-Based Cryptography: Algorithms and Bit-Sliced Implementations

3. Achieving One-Round Password-Based Authenticated Key Exchange over Lattices

4. Horizontal Side-Channel Vulnerabilities of Post-Quantum Key Exchange and Encapsulation Protocols

5. High-Performance Constant-Time Discrete Gaussian Sampling

6. Lattice-based remote user authentication from reusable fuzzy signature

7. Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme

8. Reconciliation based key exchange schemes using lattices: a review

9. Exploring Energy Efficient Architectures for RLWE Lattice-Based Cryptography

10. BKW-attack on NTRUCIPHER and NTRUCIPHER+ enctyption schemes

11. One Bit is All It Takes: A Devastating Timing Attack on BLISS’s Non-Constant Time Sign Flips

12. (In)Security of Ring-LWE Under Partial Key Exposure

13. Towards a Ring Analogue of the Leftover Hash Lemma

14. Lattice-Based Public Key Searchable Encryption from Experimental Perspectives

15. Efficient Software Implementation of Ring-LWE Encryption on IoT Processors

16. An automatic analysis approach toward indistinguishability of sampling on the LWE problem

17. An efficient and light weight polynomial multiplication for ideal lattice-based cryptography

18. RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography

19. Matrix Lie group as an algebraic structure for NTRU like cryptosystem

20. Efficient FPGA Implementation of Modular Multiplication and Exponentiation

21. Lattice-based group signature scheme without random oracle

22. An Efficient Implementation of the NewHope Key Exchange on FPGAs

23. On the Concrete Security of Lattice-Based Cryptography

24. Efficient Lattice-Based Inner-Product Functional Encryption

25. Optimized Polynomial Multiplier Architectures for Post-Quantum KEM Saber

26. Studying OpenCL-based Number Theoretic Transform for heterogeneous platforms

27. Practical Side-Channel and Fault Attacks on Lattice-Based Cryptography

28. Anti-Quantum Lattice-Based Ring Signature Scheme and Applications in VANETs

29. Preface to special topic on lattice-based cryptography

30. The Ring-LWE Problem in Lattice-Based Cryptography: The Case of Twisted Embeddings

31. Improving BDD Enumeration for LWE Problem Using GPU

32. A Review of Sieve Algorithms in Solving the Shortest Lattice Vector Problem

33. A Lightweight Post-Quantum Lattice-Based RSA for Secure Communications

34. Single-Trace Attacks on Message Encoding in Lattice-Based KEMs

35. Lattice-Based Incremental Signature Scheme for the Authenticated Data Update in Fog Computing

36. The Role of Non-Positional Arithmetic on Efficient Emerging Cryptographic Algorithms

37. Design and Implementation of Constant-Round Dynamic Group Key Exchange from RLWE

38. Lattice‐Based Cryptography and Internet of Things

39. Revisiting post-quantum hash proof systems over lattices for Internet of Thing authentications

40. Optimized Schoolbook Polynomial Multiplication for Compact Lattice-Based Cryptography on FPGA

41. A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography

42. EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method

43. Evaluation of Post-Quantum Distributed Ledger Cryptography

44. Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices

45. Efficient Ring Signature Scheme Without Random Oracle from Lattices

46. A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack

47. Comparative Analysis of Elliptic Curve and Lattice Based Cryptography

48. Efficient Implementations of Sieving and Enumeration Algorithms for Lattice-Based Cryptography

49. DARM: A Low-Complexity and Fast Modular Multiplier for Lattice-Based Cryptography

50. Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography

Catalog

Books, media, physical & digital resources