Results 31 to 40 of about 22,820 (205)

Obtaining the soliton solutions of local M-fractional magneto-electro-elastic media

open access: yesHeliyon, 2023
In this research paper, the generalized projective Riccati equations method (GPREM) is applied successfully to procure the soliton solutions of the local M-fractional longitudinal wave equation (LWE) arising in mathematical physics with dispersion caused
Neslihan Ozdemir   +3 more
doaj   +1 more source

Additively Homomorphic Ring-LWE Masking [PDF]

open access: yes, 2016
In this paper, we present a new masking scheme for ring-LWE decryption. Our scheme exploits the additively-homomorphic property of the existing ring-LWE encryption schemes and computes an additive-mask as an encryption of a random message. Our solution differs in several aspects from the recent masked ring-LWE implementation by Reparaz et al. presented
De Clercq, Ruan   +4 more
openaire   +2 more sources

Reduction From Module-SIS to Ring-SIS Under Norm Constraint of Ring-SIS

open access: yesIEEE Access, 2020
Lattice-based cryptographic scheme is constructed based on hard problems on a lattice such as the short integer solution (SIS) problem and the learning with error (LWE).
Zahyun Koo, Jong-Seon No, Young-Sik Kim
doaj   +1 more source

Estimation of the hardness of the learning with errors problem with a restricted number of samples

open access: yesJournal of Mathematical Cryptology, 2019
The Learning With Errors (LWE) problem is one of the most important hardness assumptions lattice-based constructions base their security on. In 2015, Albrecht, Player and Scott presented the software tool LWE-Estimator to estimate the hardness of ...
Bindel Nina   +3 more
doaj   +1 more source

Ad Hoc Multi-Input Functional Encryption [PDF]

open access: yes, 2019
Consider sources that supply sensitive data to an aggregator. Standard encryption only hides the data from eavesdroppers, but using specialized encryption one can hope to hide the data (to the extent possible) from the aggregator itself.
Agrawal, Shweta   +5 more
core   +2 more sources

Ring-LWE in Polynomial Rings [PDF]

open access: yes, 2012
The Ring-LWE problem, introduced by Lyubashevsky, Peikert, and Regev (Eurocrypt 2010), has been steadily finding many uses in numerous cryptographic applications. Still, the Ring-LWE problem defined in [LPR10] involves the fractional ideal R ∨, the dual of the ring R , which is the source of many theoretical and implementation technicalities. Until now,
Ducas, Léo, Durmus, Alain
openaire   +2 more sources

A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack

open access: yesJournal of Mathematical Cryptology, 2019
Over the past decade, the hybrid lattice-reduction and meet-in-the middle attack (called hybrid attack) has been used to evaluate the security of many lattice-based cryptographic schemes such as NTRU, NTRU Prime, BLISS and more.
Wunderer Thomas
doaj   +1 more source

Security considerations for Galois non-dual RLWE families [PDF]

open access: yes, 2017
We explore further the hardness of the non-dual discrete variant of the Ring-LWE problem for various number rings, give improved attacks for certain rings satisfying some additional assumptions, construct a new family of vulnerable Galois number fields ...
D Micciancio   +13 more
core   +2 more sources

Quantum-secure message authentication via blind-unforgeability [PDF]

open access: yes, 2020
Formulating and designing unforgeable authentication of classical messages in the presence of quantum adversaries has been a challenge, as the familiar classical notions of unforgeability do not directly translate into meaningful notions in the quantum ...
CH Bennett   +17 more
core   +3 more sources

A Toolkit for Ring-LWE Cryptography [PDF]

open access: yes, 2013
Recent advances in lattice cryptography, mainly stemming from the development of ring-based primitives such as ring-LWE, have made it possible to design cryptographic schemes whose efficiency is competitive with that of more traditional number-theoretic ones, along with entirely new applications like fully homomorphic encryption.
Lyubashevsky, Vadim   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy