Search

Your search keyword '"Lattice-based cryptography"' showing total 1,568 results

Search Constraints

Start Over You searched for: Descriptor "Lattice-based cryptography" Remove constraint Descriptor: "Lattice-based cryptography"
1,568 results on '"Lattice-based cryptography"'

Search Results

101. An Improved BKW Algorithm for Solving LWE with Small Secrets

102. A Survey of Software Implementations for the Number Theoretic Transform

103. Constant-Size Group Signatures with Message-Dependent Opening from Lattices

104. Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir’s Secret Sharing Scheme

106. NTWE: A Natural Combination of NTRU and LWE

107. On the Hardness of Scheme-Switching Between SIMD FHE Schemes

109. Quantum-defended Digital Signature on Lattice for IoT-enabled Systems

110. Concrete Security from Worst-Case to Average-Case Lattice Reductions

111. Practical Improvements on BKZ Algorithm

113. Identity-Based Encryption from Lattices Using Approximate Trapdoors

114. SP2P-MAKA: Smart Contract Based Secure P2P Mutual Authentication Key Agreement Protocol for Intelligent Energy System

115. Quantum-Defended Lattice-Based Anonymous Mutual Authentication and Key-Exchange Scheme for the Smart-Grid System

116. Efficient Pseudo-Random Number Generator Using Number-Theoretic Transform

117. A Lightweight Identification Protocol Based on Lattices

118. One-Hot Conversion: Towards Faster Table-Based A2B Conversion

119. Identity-based Interactive Aggregate Signatures from Lattices

120. Fast First-Order Masked NTTRU

121. Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation

122. TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation

123. Reveal the Invisible Secret: Chosen-Ciphertext Side-Channel Attacks on NTRU

126. Compact Public-Key Encryption Using Learning with Rounding

127. Post-quantum cryptography : cryptanalysis and implementation

128. Flexible and Compact MLWE-Based KEM

129. A new lattice-based password authenticated key exchange scheme with anonymity and reusable key

130. A (t,n)- Secret image sharing with steganography based on Rook polynomial and LWE problem.

131. Lattice-based autonomous path proxy re-encryption in the standard model.

132. Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices.

133. Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices.

134. On the security of ring learning with error‐based key exchange protocol against signal leakage attack.

135. Fast verification and public key storage optimization for unstructured lattice-based signatures.

136. Estimates of Implementation Complexity for Quantum Cryptanalysis of Post-Quantum Lattice-Based Cryptosystems.

137. Security estimation of LWE via BKW algorithms.

138. NLSP: A novel lattice‐based secure primitive for privacy‐preserving smart grid communications.

139. The Design of Efficient and Secure Lattice-based (FH)E

140. Lattice‐based cryptosystems in standardisation processes: A survey

141. Cryptanalysis and applications of lattice-based encryption schemes

142. A constant-size lattice-based partially-dynamic group signature scheme in quantum random oracle model

143. Chosen ciphertext correlation power analysis on Kyber.

144. LAMA: A secure lattice-based authentication scheme for cloud storage against misbehaved private key generator.

145. Non-interactive verifiable LWE-based multi secret sharing scheme.

146. LACT+: Practical Post-Quantum Scalable Confidential Transactions.

147. The Need for Being Explicit: Failed Attempts to Construct Implicit Certificates from Lattices.

148. An LWE-based verifiable multi-keyword search scheme in cloud storage.

149. Group signatures and more from isogenies and lattices: generic, simple, and efficient.

150. A Number-Theoretic Transform Algorithm on A New Polynomial Ring.

Catalog

Books, media, physical & digital resources