Results 181 to 190 of about 22,820 (205)
Some of the next articles are maybe not open access.

High-Throughput Ring-LWE Cryptoprocessors

IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2017
This paper presents the design of ring learning with errors (LWE) cryptoprocessors using number theoretic transform (NTT) cores and Gaussian samplers based on the inverse transform method. The NTT cores are designed using radix-2 and radix-8 decimation-in-frequency NTT algorithms and pipeline architectures.
Claudia Patricia Renteria-Mejia   +1 more
openaire   +1 more source

Cryptanalysis of Compact-LWE

2018
As an invited speaker of the ACISP 2017 conference, Dongxi Liu recently introduced a new lattice-based encryption scheme (joint work with Li, Kim and Nepal) designed for lightweight IoT applications. The new scheme, which has been submitted to the NIST post-quantum competition, is based on a variant of standard LWE called Compact-LWE, but is claimed to
Jonathan Bootle   +2 more
openaire   +1 more source

Lossiness and Entropic Hardness for Ring-LWE

2020
The hardness of the Ring Learning with Errors problem (RLWE) is a central building block for efficiency-oriented lattice-based cryptography. Many applications use an “entropic” variant of the problem where the so-called “secret” is not distributed uniformly as prescribed but instead comes from some distribution with sufficient min-entropy. However, the
Brakerski, Zvika, Döttling, Nico
openaire   +1 more source

Error analysis of weak Poly-LWE instances

Cryptography and Communications, 2018
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yao Chen   +3 more
openaire   +2 more sources

Reusable Fuzzy Extractor from LWE

2018
Fuzzy extractor converts the reading of a noisy non-uniform source to a reproducible and almost uniform output \(\mathsf {R}\). The output \(\mathsf {R}\) in turn is used in some cryptographic system as a secret key. To enable multiple extractions of keys \(\mathsf {R}_1, \mathsf {R}_2, \ldots , \mathsf {R}_\rho \) from the same noisy non-uniform ...
Yunhua Wen, Shengli Liu
openaire   +1 more source

Memory-Efficient Attacks on Small LWE Keys

Journal of Cryptology
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Andre Esser   +2 more
openaire   +2 more sources

AxRLWE: A Multilevel Approximate Ring-LWE Co-Processor for Lightweight IoT Applications

IEEE Internet of Things Journal, 2022
Maire O'Neill, Ayesha Khalid, Song Bian
exaly  

A High-Performance Domain-Specific Processor With Matrix Extension of RISC-V for Module-LWE Applications

IEEE Transactions on Circuits and Systems I: Regular Papers, 2022
Yifan Zhao, Ruiqi Xie, Guozhu Xin
exaly  

Parallelizable Delegation from LWE

2022
Cody Freitag, Rafael Pass, Naomi Sirkin
openaire   +1 more source

Home - About - Disclaimer - Privacy