Search

Your search keyword '"ring-lwe"' showing total 21 results

Search Constraints

Start Over You searched for: Descriptor "ring-lwe" Remove constraint Descriptor: "ring-lwe" Topic lattice-based cryptography Remove constraint Topic: lattice-based cryptography
21 results on '"ring-lwe"'

Search Results

1. On Advances of Lattice-Based Cryptographic Schemes and Their Implementations.

2. On the hardness of NTRU problems.

3. LizarMong: Excellent Key Encapsulation Mechanism Based on RLWE and RLWR

4. Towards a Ring Analogue of the Leftover Hash Lemma

5. (In)Security of Ring-LWE Under Partial Key Exposure

6. BI-NTRU Encryption Schemes: Two New Secure Variants of NTRU

7. Efficient KEA-Style Lattice-Based Authenticated Key Exchange

8. NTRU Prime: Reducing Attack Surface at Low Cost

9. Reconciliation based key exchange schemes using lattices: a review.

10. Towards a Ring Analogue of the Leftover Hash Lemma.

11. (In)Security of Ring-LWE Under Partial Key Exposure.

12. Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols

13. Compact Ring-LWE Cryptoprocessor

14. A New Ring-Based SPHF and PAKE Protocol on Ideal Lattices.

15. HEPCloud: An FPGA-Based Multicore Processor for FV Somewhat Homomorphic Function Evaluation.

16. A Resource-Efficient and Side-Channel Secure Hardware Implementation of Ring-LWE Cryptographic Processor.

17. A novel combined correlation power analysis (CPA) attack on schoolbook polynomial multiplication in lattice-based cryptosystems

18. Towards a Ring Analogue of the Leftover Hash Lemma

19. CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes

20. Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols

21. NTRU prime: reducing attack surface at low cost

Catalog

Books, media, physical & digital resources