Results 291 to 300 of about 211,169 (330)
Some of the next articles are maybe not open access.
Practice-Oriented Techniques in Lattice-Based Cryptography
, 2020In today’s computerised world, billions of people rely heavily on security systems that protect a tremendous amount of sensitive information ranging from banking information to government secrets.
Muhammed F. Esgin
semanticscholar +3 more sources
Combined Fault and DPA Protection for Lattice-Based Cryptography
IEEE transactions on computers, 2023The progress on constructing quantum computers and the ongoing standardization of post-quantum cryptography (PQC) have led to the development and refinement of promising new digital signature schemes and key encapsulation mechanisms (KEM).
Daniel Heinz, T. Pöppelmann
semanticscholar +1 more source
Faster Implementation of Ideal Lattice-Based Cryptography Using AVX512
ACM Transactions on Embedded Computing Systems, 2023With the development of quantum computing, the existing cryptography schemes based on classical cryptographic primitives will no longer be secure. Hence, cryptographers are designing post-quantum cryptographic (PQC) schemes, and ideal lattice-based ...
Douwei Lei+5 more
semanticscholar +1 more source
Ultra High-Speed Polynomial Multiplications for Lattice-Based Cryptography on FPGAs
IEEE Transactions on Emerging Topics in Computing, 2022Lattice-based cryptography (LBC) has emerged as the most viable substitutes to the classical cryptographic schemes as 5 out of 7 finalist schemes in the 3rd round of the NIST post-quantum cryptography (PQC) standardization process are lattice based in ...
D. Kundi+5 more
semanticscholar +1 more source
An Efficient Security Solution for IoT and Cloud Security Using Lattice-Based Cryptography
2023 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC), 2023This study introduces lattice-based cryptography to enhance security in IoT and cloud systems. It focuses on two fundamental challenges in lattice-based encryption.
P. Bagla+5 more
semanticscholar +1 more source
Pipelined High-Throughput NTT Architecture for Lattice-Based Cryptography
Asian Hardware-Oriented Security and Trust Symposium, 2021Lattice-based cryptography is a powerful cryptographic primitive that can achieve post-quantum security. The most computational-intensive operations in the lattice-based cryptographic schemes are the polynomial multiplications over the ring, which can be
Weihang Tan+4 more
semanticscholar +1 more source
2020
In this chapter, you will get an overview of lattice-based cryptography. You will learn why lattices are important in the cryptography field and the challenges in using them. Further, you will explore a practical implementation that uses lattices, namely the GGH (Goldreich–Goldwasser–Halevi) encryption scheme [1].
Stefania Loredana Nita+1 more
openaire +2 more sources
In this chapter, you will get an overview of lattice-based cryptography. You will learn why lattices are important in the cryptography field and the challenges in using them. Further, you will explore a practical implementation that uses lattices, namely the GGH (Goldreich–Goldwasser–Halevi) encryption scheme [1].
Stefania Loredana Nita+1 more
openaire +2 more sources
A High Speed NTT Accelerator for Lattice-Based Cryptography
2021 International Conference on Communications, Information System and Computer Engineering (CISCE), 2021As the most computing-intensive operation in lattice-based cryptography, polynomial multiplication is the bottleneck for high speed and low-latency implementation of these schemes.
Chongyang Li, Wenping Zhu, Leibo Liu
semanticscholar +1 more source
DARM: A Low-Complexity and Fast Modular Multiplier for Lattice-Based Cryptography
IEEE International Conference on Application-Specific Systems, Architectures, and Processors, 2021The lattice-based cryptography (LBC) has been widely used recently in many compute-intensive applications, such as the post-quantum cryptography (PQC) and privacy-preserving deep learning, where the main task for such applications is to improve the ...
Xiao Hu+3 more
semanticscholar +1 more source
Comparative Analysis of Elliptic Curve and Lattice Based Cryptography
Annual Modeling and Simulation Conference, 2021In this paper, we provide a mathematical background and analysis of Lattice Based Cryptography for the less mathematically mature reader. Discussing the benefits and constraints of Lattice Based Crypto, we compare and contrast with Elliptic Curve ...
A. Davenport, S. Shetty
semanticscholar +1 more source