Results 21 to 30 of about 88 (52)

A Comparison of NTRU Variants [PDF]

open access: yes, 2018
We analyze the size vs. security trade-offs that are available when selecting parameters for perfectly correct key encapsulation mechanisms based on ...
John M. Schanck
core  

Performance and Efficiency Exploration of Hardware Polynomial Multipliers for Post-Quantum Lattice-Based Cryptosystems [PDF]

open access: yes
The significant effort in the research and design of large-scale quantum computers has spurred a transition to post-quantum cryptographic primitives worldwide.
Antognazza, Francesco   +3 more
core   +1 more source

Cache-22: A Highly Deployable End-To-End Encrypted Cache System with Post-Quantum Security [PDF]

open access: yes, 2022
Cache systems are crucial for reducing communication overhead on the Internet. The importance of communication privacy is being increasingly and widely recognized; therefore, we anticipate that nearly all end-to-end communication will be encrypted via ...
Keita Emura   +3 more
core  

Too Many Hints - When LLL Breaks LWE [PDF]

open access: yes, 2023
All modern lattice-based schemes build on variants of the LWE problem. Information leakage of the LWE secret $\mathbf s \in \mathbb{Z}_q^n$ is usually modeled via so-called hints, i.e., inner products of $\mathbf s$ with some (random, but known) vector.
Alexander May, Julian Nowakowski
core  

A note on Post Quantum Onion Routing [PDF]

open access: yes, 2021
Even though the currently used encryption and signature schemes are well tested and secure in a classical computational setting, they are not quantum-resistant as Shor\u27s work proves.
Kelesidis Evgnosia-Alexandra
core  

Streamlined NTRU Prime on FPGA [PDF]

open access: yes, 2022
We present a novel full hardware implementation of Streamlined NTRU Prime, with two variants: A high-speed, high-area implementation, and a slower, low-area implementation.
Adrian Marotzke   +4 more
core  

On the Success Probability of Solving Unique SVP via BKZ [PDF]

open access: yes, 2021
As lattice-based key encapsulation, digital signature, and fully homomorphic encryption schemes near standardisation, ever more focus is being directed to the precise estimation of the security of these schemes.
Eamonn W. Postlethwaite   +1 more
core  

A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial Sampling [PDF]

open access: yes, 2023
The sampling of polynomials with fixed weight is a procedure required by round-4 Key Encapsulation Mechanisms (KEMs) for Post-Quantum Cryptography (PQC) standardization (BIKE, HQC, McEliece) as well as NTRU, Streamlined NTRU Prime, and NTRU LPRrime ...
Georg Land   +3 more
core  

Доведення без розголошення на основі криптосистем, стійкість яких базується на задачах навчання з помилками [PDF]

open access: yes, 2021
Метою дипломної роботи є доведення без розголошення для криптосистем, стiйкiсть яких базується на задачах навчання з помилками, що забезпечить якiсне використання таких структур у криптографiї.
Тузовська, Марія Андріївна
core  

Quantum Key Search for Ternary LWE [PDF]

open access: yes, 2021
Ternary LWE, i.e., LWE with coefficients of the secret and the error vectors taken from $\{-1, 0, 1\}$, is a popular choice among NTRU-type cryptosystems and some signatures schemes like BLISS and GLP.
Alexander May   +2 more
core  

Home - About - Disclaimer - Privacy