Results 1 to 10 of about 798 (212)
BBAS: A blockchain-based authentication system for e-health with multi-factor authentication, access control, and post-quantum security. [PDF]
Latif R +4 more
europepmc +1 more source
Distributed Identity Authentication with Lenstra-Lenstra-Lovász Algorithm-Ciphertext Policy Attribute-Based Encryption from Lattices: An Efficient Approach Based on Ring Learning with Errors Problem. [PDF]
Yuan Q +6 more
europepmc +1 more source
Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing. [PDF]
Zhao M, Chen H.
europepmc +1 more source
Cryptographic protection of RGB images using SPN over Eisenstein integer ring modulo Eisenstein prime. [PDF]
Sajjad M +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Post-Quantum Lattice-Based Cryptography Implementations
ACM Computing Surveys, 2019The advent of quantum computing threatens to break many classical cryptographic schemes, leading to innovations in public key cryptography that focus on post-quantum cryptography primitives and protocols resistant to quantum computing threats. Lattice-based cryptography is a promising post-quantum cryptography family, both in terms of foundational ...
Hamid Nejatollahi +2 more
exaly +2 more sources
Lattice-Based Cryptography: A Survey
Chinese Annals of Mathematics, Series B, 2023zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Wang, Xiaoyun, Xu, Guangwu, Yu, Yang
openaire +2 more sources
2020
In this chapter, you will get an overview of lattice-based cryptography. You will learn why lattices are important in the cryptography field and the challenges in using them. Further, you will explore a practical implementation that uses lattices, namely the GGH (Goldreich–Goldwasser–Halevi) encryption scheme [1].
Marius Iulian Mihailescu +1 more
openaire +1 more source
In this chapter, you will get an overview of lattice-based cryptography. You will learn why lattices are important in the cryptography field and the challenges in using them. Further, you will explore a practical implementation that uses lattices, namely the GGH (Goldreich–Goldwasser–Halevi) encryption scheme [1].
Marius Iulian Mihailescu +1 more
openaire +1 more source
2017 12th International Conference on Computer Engineering and Systems (ICCES), 2017
Among the different cryptosystems, the Public Key Cryptosystems (PKCS) are of great usage and are used in many applications. Most of the current PKCS are based on a hard problem making the cryptanalysis of such cipher infeasible given the current computing and memory availability.
Ayman Wagih Mohsen +2 more
openaire +1 more source
Among the different cryptosystems, the Public Key Cryptosystems (PKCS) are of great usage and are used in many applications. Most of the current PKCS are based on a hard problem making the cryptanalysis of such cipher infeasible given the current computing and memory availability.
Ayman Wagih Mohsen +2 more
openaire +1 more source

