Results 241 to 250 of about 243,777 (273)
Some of the next articles are maybe not open access.

Identity-Concealed Authenticated Encryption from Ring Learning with Errors

2019
Authenticated encryption (AE) is very suitable for a resources constrained environment for it needs less computational costs and AE has become one of the important technologies of modern communication security. Identity concealment is one of research focuses in design and analysis of current secure transport protocols (such as TLS1.3 and Google’s QUIC).
Chao Liu   +3 more
openaire   +1 more source

On the security of ring learning with error‐based key exchange protocol against signal leakage attack

SECURITY AND PRIVACY, 2023
AbstractDue to the rapid development of mobile communication and hardware technologies, several mobile‐based web applications have gained popularity among mobile users. Mobile users can utilize these devices to access numerous services over the Internet.
Komal Pursharthi, Dheerendra Mishra
openaire   +1 more source

Cryptanalysis on Attribute-Based Encryption from Ring-Learning with Error (R-LWE)

2020
The encouraging outcomes on the hardness of the lattice-based problem in resisting the recent quantum attacks have aroused the recent works of attribute-based encryption (ABE) schemes. In October 2014, Zhu et al. presented an increasingly proficient ABE with the hardness of ring-learning with error (R-LWE), so-called as \(ABE_{R{\text {-}}LWE}\) scheme.
Tan Soo Fun, Azman Samsudin
openaire   +1 more source

Faster Number Theoretic Transform on Graphics Processors for Ring Learning with Errors Based Cryptography

2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), 2018
The Number Theoretic Transform (NTT) has been revived recently by the advent of the Ring-Learning with Errors (Ring-LWE) Homomorphic Encryption (HE) schemes. In these schemes, the NTT is used to calculate the product of high degree polynomials with multi-precision coefficients in quasilinear time.
Ahmad Al Badawi   +2 more
openaire   +1 more source

A Gaussian Sampler for Ring-Learning-With-Errors Scheme Reusing a Cryptographic Module

Advanced Science and Technology Letters, 2015
Since the different characteristics from the PRNG (Pseudo Random Number Generator) or various deterministic devices such as arithmetic processing units, new concepts and test methods should be suggested in order to test TRNG (Ture Random Number Generator).
openaire   +1 more source

Trade-off between Performance and Security for Coding and Ring Learning With Errors-based Diffie-Hellman Cryptosystems

2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT), 2019
In this work, we provide a complexity analysis of the trade-off between performance and security for two post-quantum key exchange cryptosystems: a protocol based on coding theory (Ouroboros) and the lattice-based ring learning with errors key exchange (RLWE).
Claudio Tellez   +2 more
openaire   +1 more source

Ring Learning With Errors: A crossroads between postquantum cryptography, machine learning and number theory

2019
arXiv admin note: text overlap with arXiv:1508.01375 by other authors/ comment of the author: quotation has been added to Theorem 5 ...
openaire   +1 more source

Blockchain-based Smart Parking System using Ring Learning With Errors based Signature

2022 6th International Conference on Cryptography, Security and Privacy (CSP), 2022
Jihan Lailatul Atiqoh   +2 more
openaire   +1 more source

Lightweight Ring Learning With Errors Cryptographic Scheme for Secure Cloud-IoT Systems

2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT), 2023
Mangala N, Eswara Reddy B, Venugopal K R
openaire   +1 more source

A Certificateless Authenticated Key Exchange Protocol Based on Ring Learning with Errors

2022 IEEE 10th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), 2022
Luyao Ma, Li Li, Hongfei Yang
openaire   +1 more source

Home - About - Disclaimer - Privacy