Results 41 to 50 of about 18,897 (311)

Security estimation of LWE via BKW algorithms

open access: yesCybersecurity, 2023
The Learning With Errors (LWE) problem is widely used in lattice-based cryptography, which is the most promising post-quantum cryptography direction. There are a variety of LWE-solving methods, which can be classified into four groups: lattice methods ...
Yu Wei, Lei Bi, Xianhui Lu, Kunpeng Wang
doaj   +1 more source

Lattice-Based Cryptography in the Quantum Era: A Survey

open access: yesInterfases, 2023
The advent of quantum computing reveals current classical cryptography’s incapacity to withstand attacks within the new paradigm. Quantum algorithms break such encryption with impressive ease, with Shor and Grover algorithms being the main perpetrators ...
Mauricio Cisneros, Javier Olazabal
doaj   +1 more source

Quantum attacks on Bitcoin, and how to protect against them [PDF]

open access: yes, 2017
The key cryptographic protocols used to secure the internet and financial transactions of today are all susceptible to attack by the development of a sufficiently large quantum computer.
Aggarwal, Divesh   +4 more
core   +3 more sources

Chosen-ciphertext security from subset sum [PDF]

open access: yes, 2015
We construct a public-key encryption (PKE) scheme whose security is polynomial-time equivalent to the hardness of the Subset Sum problem. Our scheme achieves the standard notion of indistinguishability against chosen-ciphertext attacks (IND-CCA) and can
A Shallue   +26 more
core   +2 more sources

Evaluation of Post-Quantum Distributed Ledger Cryptography

open access: yesThe Journal of The British Blockchain Association, 2019
This paper evaluates the current cybersecurity vulnerability of the prolific use of Elliptical Curve Digital Signature Algorithm (**ECDSA**) cryptography in use by the Bitcoin Core, Ethereum, Bitcoin Cash, and enterprise blockchains such as Multi-Chain ...
Robert Campbell Sr.
doaj   +2 more sources

Markov Chain Monte Carlo Algorithms for Lattice Gaussian Sampling

open access: yes, 2014
Sampling from a lattice Gaussian distribution is emerging as an important problem in various areas such as coding and cryptography. The default sampling algorithm --- Klein's algorithm yields a distribution close to the lattice Gaussian only if the ...
Hanrot, Guillaume   +2 more
core   +1 more source

BAT: Small and Fast KEM over NTRU Lattices

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
We present BAT – an IND-CCA secure key encapsulation mechanism (KEM) that is based on NTRU but follows an encryption/decryption paradigm distinct from classical NTRU KEMs.
Pierre-Alain Fouque   +3 more
doaj   +1 more source

A Survey on Homomorphic Encryption Schemes: Theory and Implementation

open access: yes, 2017
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas   +3 more
core   +1 more source

Families of fast elliptic curves from Q-curves [PDF]

open access: yes, 2013
We construct new families of elliptic curves over \(\FF_{p^2}\) with efficiently computable endomorphisms, which can be used to accelerate elliptic curve-based cryptosystems in the same way as Gallant-Lambert-Vanstone (GLV) and Galbraith-Lin-Scott (GLS ...
Smith, Benjamin
core   +7 more sources

Improvements on Making BKW Practical for Solving LWE

open access: yesCryptography, 2021
The learning with errors (LWE) problem is one of the main mathematical foundations of post-quantum cryptography. One of the main groups of algorithms for solving LWE is the Blum–Kalai–Wasserman (BKW) algorithm. This paper presents new improvements of BKW-
Alessandro Budroni   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy