Results 271 to 280 of about 18,897 (311)
Pipelined and conflict-free number theoretic transform accelerator for CRYSTALS-Kyber on FPGA. [PDF]
Waris A, Aziz A, Khan BM.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Post-Quantum Lattice-Based Cryptography Implementations
ACM Computing Surveys, 2019The advent of quantum computing threatens to break many classical cryptographic schemes, leading to innovations in public key cryptography that focus on post-quantum cryptography primitives and protocols resistant to quantum computing threats. Lattice-based cryptography is a promising post-quantum cryptography family, both in terms of foundational ...
Hamid Nejatollahi +2 more
exaly +2 more sources
Lattice-Based Cryptography: A Survey
Chinese Annals of Mathematics, Series B, 2023zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Wang, Xiaoyun, Xu, Guangwu, Yu, Yang
openaire +2 more sources
2020
In this chapter, you will get an overview of lattice-based cryptography. You will learn why lattices are important in the cryptography field and the challenges in using them. Further, you will explore a practical implementation that uses lattices, namely the GGH (Goldreich–Goldwasser–Halevi) encryption scheme [1].
Marius Iulian Mihailescu +1 more
openaire +1 more source
In this chapter, you will get an overview of lattice-based cryptography. You will learn why lattices are important in the cryptography field and the challenges in using them. Further, you will explore a practical implementation that uses lattices, namely the GGH (Goldreich–Goldwasser–Halevi) encryption scheme [1].
Marius Iulian Mihailescu +1 more
openaire +1 more source
2017 12th International Conference on Computer Engineering and Systems (ICCES), 2017
Among the different cryptosystems, the Public Key Cryptosystems (PKCS) are of great usage and are used in many applications. Most of the current PKCS are based on a hard problem making the cryptanalysis of such cipher infeasible given the current computing and memory availability.
Ayman Wagih Mohsen +2 more
openaire +1 more source
Among the different cryptosystems, the Public Key Cryptosystems (PKCS) are of great usage and are used in many applications. Most of the current PKCS are based on a hard problem making the cryptanalysis of such cipher infeasible given the current computing and memory availability.
Ayman Wagih Mohsen +2 more
openaire +1 more source
Efficient arithmetic for lattice-based cryptography
Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis Companion, 2017Lattice-based cryptography is a promising family of post quantum algorithms. Contrary to other approaches, lattice-based primitives are extremely versatile and allow the realisation of several essential cryptographic primitives, such as encryption and digital signatures.
Elizabeth O'Sullivan +1 more
openaire +1 more source
Lattice-Based Cryptography and NTRU
2021With the publication of Peter Shor’s seminal paper that factoring and discrete log computations would be entirely feasible on a quantum computer, and with advances in the building of quantum computers, there has been a focus on what is referred to as “post-quantum cryptography”.
openaire +1 more source

