Results 181 to 190 of about 22,820 (205)
Some of the next articles are maybe not open access.
High-Throughput Ring-LWE Cryptoprocessors
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2017This paper presents the design of ring learning with errors (LWE) cryptoprocessors using number theoretic transform (NTT) cores and Gaussian samplers based on the inverse transform method. The NTT cores are designed using radix-2 and radix-8 decimation-in-frequency NTT algorithms and pipeline architectures.
Claudia Patricia Renteria-Mejia +1 more
openaire +1 more source
2018
As an invited speaker of the ACISP 2017 conference, Dongxi Liu recently introduced a new lattice-based encryption scheme (joint work with Li, Kim and Nepal) designed for lightweight IoT applications. The new scheme, which has been submitted to the NIST post-quantum competition, is based on a variant of standard LWE called Compact-LWE, but is claimed to
Jonathan Bootle +2 more
openaire +1 more source
As an invited speaker of the ACISP 2017 conference, Dongxi Liu recently introduced a new lattice-based encryption scheme (joint work with Li, Kim and Nepal) designed for lightweight IoT applications. The new scheme, which has been submitted to the NIST post-quantum competition, is based on a variant of standard LWE called Compact-LWE, but is claimed to
Jonathan Bootle +2 more
openaire +1 more source
Lossiness and Entropic Hardness for Ring-LWE
2020The hardness of the Ring Learning with Errors problem (RLWE) is a central building block for efficiency-oriented lattice-based cryptography. Many applications use an “entropic” variant of the problem where the so-called “secret” is not distributed uniformly as prescribed but instead comes from some distribution with sufficient min-entropy. However, the
Brakerski, Zvika, Döttling, Nico
openaire +1 more source
Error analysis of weak Poly-LWE instances
Cryptography and Communications, 2018zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yao Chen +3 more
openaire +2 more sources
Reusable Fuzzy Extractor from LWE
2018Fuzzy extractor converts the reading of a noisy non-uniform source to a reproducible and almost uniform output \(\mathsf {R}\). The output \(\mathsf {R}\) in turn is used in some cryptographic system as a secret key. To enable multiple extractions of keys \(\mathsf {R}_1, \mathsf {R}_2, \ldots , \mathsf {R}_\rho \) from the same noisy non-uniform ...
Yunhua Wen, Shengli Liu
openaire +1 more source
Memory-Efficient Attacks on Small LWE Keys
Journal of CryptologyzbMATH Open Web Interface contents unavailable due to conflicting licenses.
Andre Esser +2 more
openaire +2 more sources
AxRLWE: A Multilevel Approximate Ring-LWE Co-Processor for Lightweight IoT Applications
IEEE Internet of Things Journal, 2022Maire O'Neill, Ayesha Khalid, Song Bian
exaly
IEEE Transactions on Circuits and Systems I: Regular Papers, 2022
Yifan Zhao, Ruiqi Xie, Guozhu Xin
exaly
Yifan Zhao, Ruiqi Xie, Guozhu Xin
exaly
Parallelizable Delegation from LWE
2022Cody Freitag, Rafael Pass, Naomi Sirkin
openaire +1 more source

