Search

Your search keyword '"Lattice-based cryptography"' showing total 1,568 results

Search Constraints

Start Over You searched for: Descriptor "Lattice-based cryptography" Remove constraint Descriptor: "Lattice-based cryptography"
1,568 results on '"Lattice-based cryptography"'

Search Results

2. Shrinkable Ring Signatures: It Wasn’t Them!

3. An Efficient Threshold Ring Signature from G+G Identification Protocol

5. PPLBB: a novel privacy-preserving lattice-based blockchain platform in IoMT.

6. Scabbard: An Exploratory Study on Hardware Aware Design Choices of Learning with Rounding-based Key Encapsulation Mechanisms.

7. Lazy Modular Reduction for NTT.

8. Identity-based chameleon hash from lattices.

9. An algebraic algorithm for breaking NTRU with multiple keys.

10. A efficient lattice-based forward-secure linearly homomorphic signature scheme for network coding: A efficient lattice-based forward-secure linearly homomorphic signature scheme for network...: B. Wu et al.

11. Lattice‐Based CP‐ABE for Optimal Broadcast Encryption With Polynomial‐Depth Circuits.

12. A Comprehensive Review of MI-HFE and IPHFE Cryptosystems: Advances in Internal Perturbations for Post-Quantum Security.

13. Cryptanalysis of RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Problem in Cloud Storage.

14. Post‐quantum attack resilience blockchain‐assisted data authentication protocol for smart healthcare system.

15. Quantum Safe Multi-Factor User Authentication Protocol for Cloud-Assisted Medical IoT

16. Lattice-Based Zero-Knowledge Proofs in Action: Applications to Electronic Voting.

17. Configurable radix-4 NTT hardware optimization and implementation for lattice-based cryptography

18. Comparative analysis of lattice-based cryptographic schemes for secure IoT communications

19. Efficient post-quantum secure deterministic wallet scheme

20. A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks

21. 带抵抗解密密钥暴露的可撤销身份基加密.

22. 面向格密码的可配置基-4 NTT硬件优化与实现.

23. Comparative analysis of lattice-based cryptographic schemes for secure IoT communications.

24. QUANTUM-RESISTANT CRYPTOGRAPHIC ALGORITHMS FOR SECURE COMMUNICATION.

25. Further improvements of the estimation of key enumeration with applications to solving LWE.

26. Post-quantum security design for hierarchical healthcare systems based on lattices.

27. 环上多项式乘法在GPU 上的优化实现.

28. Efficient post-quantum secure deterministic wallet scheme.

29. Predictions for 2025: Artificial Intelligence in Modern Drug Development, Quantum Proof Encryption, and Health Data Monetization

30. Multiplying Polynomials without Powerful Multiplication Instructions

31. Revocable policy-based chameleon hash using lattices

33. Unleashing the Power of a Novel Lightweight Lattice-based CP-ABE for Robust IoT Data Transmission.

34. A New Quantum Oracle Model for a Hybrid Quantum-Classical Attack on Post-Quantum Lattice-Based Cryptosystems.

35. Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation.

36. On the Properties of Reduced Basis Related to Lattice-Reduced Algorithm.

37. Flexible and Compact MLWE-Based KEM.

38. Development of an Application for the Study of the GGH Cryptographic Scheme

39. Securing Asymmetric Key Cryptography in 6G Wireless and Mobile Environments: A Comprehensive Review and Proposed Hybrid Cryptosystem

40. Constant-Size Unbounded Multi-hop Fully Homomorphic Proxy Re-encryption from Lattices

41. Polytopes in the Fiat-Shamir with Aborts Paradigm

42. Lattice-Based Multi-entity Identification Protocols

44. Phoenix: Hash-and-Sign with Aborts from Lattice Gadgets

45. Compact Encryption Based on Module-NTRU Problems

46. Properties of Lattice Isomorphism as a Cryptographic Group Action

47. Web3 and Quantum Attacks

49. Thriving in the Quantum Era

50. Provable Dual Attacks on Learning with Errors

Catalog

Books, media, physical & digital resources