Results 21 to 30 of about 88 (52)
A Comparison of NTRU Variants [PDF]
We analyze the size vs. security trade-offs that are available when selecting parameters for perfectly correct key encapsulation mechanisms based on ...
John M. Schanck
core
Performance and Efficiency Exploration of Hardware Polynomial Multipliers for Post-Quantum Lattice-Based Cryptosystems [PDF]
The significant effort in the research and design of large-scale quantum computers has spurred a transition to post-quantum cryptographic primitives worldwide.
Antognazza, Francesco +3 more
core +1 more source
Cache-22: A Highly Deployable End-To-End Encrypted Cache System with Post-Quantum Security [PDF]
Cache systems are crucial for reducing communication overhead on the Internet. The importance of communication privacy is being increasingly and widely recognized; therefore, we anticipate that nearly all end-to-end communication will be encrypted via ...
Keita Emura +3 more
core
Too Many Hints - When LLL Breaks LWE [PDF]
All modern lattice-based schemes build on variants of the LWE problem. Information leakage of the LWE secret $\mathbf s \in \mathbb{Z}_q^n$ is usually modeled via so-called hints, i.e., inner products of $\mathbf s$ with some (random, but known) vector.
Alexander May, Julian Nowakowski
core
A note on Post Quantum Onion Routing [PDF]
Even though the currently used encryption and signature schemes are well tested and secure in a classical computational setting, they are not quantum-resistant as Shor\u27s work proves.
Kelesidis Evgnosia-Alexandra
core
Streamlined NTRU Prime on FPGA [PDF]
We present a novel full hardware implementation of Streamlined NTRU Prime, with two variants: A high-speed, high-area implementation, and a slower, low-area implementation.
Adrian Marotzke +4 more
core
On the Success Probability of Solving Unique SVP via BKZ [PDF]
As lattice-based key encapsulation, digital signature, and fully homomorphic encryption schemes near standardisation, ever more focus is being directed to the precise estimation of the security of these schemes.
Eamonn W. Postlethwaite +1 more
core
A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial Sampling [PDF]
The sampling of polynomials with fixed weight is a procedure required by round-4 Key Encapsulation Mechanisms (KEMs) for Post-Quantum Cryptography (PQC) standardization (BIKE, HQC, McEliece) as well as NTRU, Streamlined NTRU Prime, and NTRU LPRrime ...
Georg Land +3 more
core
Доведення без розголошення на основі криптосистем, стійкість яких базується на задачах навчання з помилками [PDF]
Метою дипломної роботи є доведення без розголошення для криптосистем, стiйкiсть яких базується на задачах навчання з помилками, що забезпечить якiсне використання таких структур у криптографiї.
Тузовська, Марія Андріївна
core
Quantum Key Search for Ternary LWE [PDF]
Ternary LWE, i.e., LWE with coefficients of the secret and the error vectors taken from $\{-1, 0, 1\}$, is a popular choice among NTRU-type cryptosystems and some signatures schemes like BLISS and GLP.
Alexander May +2 more
core

