Results 311 to 320 of about 211,169 (330)
Some of the next articles are maybe not open access.

AC-PM: An Area-Efficient and Configurable Polynomial Multiplier for Lattice Based Cryptography

IEEE Transactions on Circuits and Systems Part 1: Regular Papers, 2023
Xiao Hu   +3 more
semanticscholar   +1 more source

Efficient and Flexible Low-Power NTT for Lattice-Based Cryptography

IEEE International Symposium on Hardware Oriented Security and Trust, 2019
Secure communication is being threatened by the foreseeable breakthrough of quantum computers. When a larger quantum computer is developed, traditional public key cryptography will be broken.
Tim Fritzmann, Martha Johanna Sepúlveda
semanticscholar   +1 more source

Lattice-Based Cryptography: A Survey

Chinese Annals of Mathematics. Series B, 2023
Xiaoyun Wang, Guangwu Xu, Yang Yu
semanticscholar   +1 more source

Lattice Based Cryptography : Its Applications, Areas of Interest & Future Scope

International Conference Computing Methodologies and Communication, 2019
With a recent increase in the advancement of the technology, computer system and it’s sensitive data are getting exhibited to unauthorised users, with steadily corroding the fundamentals of computer security.
P. K. Pradhan   +2 more
semanticscholar   +1 more source

Heuristics and Rigor in Lattice-Based Cryptography

2010
Cryptographic schemes based on lattices first emerged in the mid-1990s, and have developed rapidly in the past few years. At the outset, works in this area fell into two very distinct types: - Heuristic proposals such as NTRU, which lacked any formal security justification but were very practical; - Schemes building on Ajtai's breakthrough work, which ...
openaire   +2 more sources

Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign

2009
We provide a brief history and overview of lattice based cryptography and cryptanalysis: shortest vector problems, closest vector problems, subset sum problem and knapsack systems, GGH, Ajtai-Dwork and NTRU. A detailed discussion of the algorithms NTRUEncrypt and NTRUSign follows.
Jill Pipher   +3 more
openaire   +2 more sources

Area-Time-Efficient Scalable Schoolbook Polynomial Multiplier for Lattice-Based Cryptography

IEEE Transactions on Circuits and Systems - II - Express Briefs, 2022
Yahya Arzani Birgani   +2 more
semanticscholar   +1 more source

Lattice-Based Cryptography and NTRU

2022
Stefania Loredana Nita   +1 more
openaire   +1 more source

Direct computation of branching programs and its applications to more efficient lattice-based cryptography

Designs, Codes and Cryptography, 2022
Shuichi Katsumata   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy