Results 271 to 280 of about 1,416 (297)
Some of the next articles are maybe not open access.
Lattice-based cryptography: From reconfigurable hardware to ASIC
2016 International Symposium on Integrated Circuits (ISIC), 2016As progress in technology is predicted to make quantum computers available in the next few decades, it is imperative to design public-key cryptosystems capable of resisting attacks that are perceived to be possible using these new platforms. Lattice-based cryptography is one of the most promising quantum-safe candidates being considered to replace ...
Oder, Tobias +5 more
openaire +3 more sources
Practice-Oriented Techniques in Lattice-Based Cryptography
2020In today’s computerised world, billions of people rely heavily on security systems that protect a tremendous amount of sensitive information ranging from banking information to government secrets. The algorithms currently used in such systems rely on classical cryptographic assumptions that do not provide security against powerful quantum computers. In
openaire +2 more sources
Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign
2009We provide a brief history and overview of lattice based cryptography and cryptanalysis: shortest vector problems, closest vector problems, subset sum problem and knapsack systems, GGH, Ajtai-Dwork and NTRU. A detailed discussion of the algorithms NTRUEncrypt and NTRUSign follows.
Jill Pipher +3 more
openaire +2 more sources
Heuristics and Rigor in Lattice-Based Cryptography
2010Cryptographic schemes based on lattices first emerged in the mid-1990s, and have developed rapidly in the past few years. At the outset, works in this area fell into two very distinct types: - Heuristic proposals such as NTRU, which lacked any formal security justification but were very practical; - Schemes building on Ajtai's breakthrough work, which ...
openaire +2 more sources
Security in quantum cryptography
Reviews of Modern Physics, 2022Christopher Portmann, Renato Renner
exaly
Entanglement-based secure quantum cryptography over 1,120 kilometres
Nature, 2020Juan Yin, Yu-Huai Li, Sheng-Kai Liao
exaly
Meta-optics empowered vector visual cryptography for high security and rapid decryption
Nature Communications, 2023Mingbo Pu, Xiangang Luo
exaly

