Results 241 to 250 of about 243,777 (273)
Some of the next articles are maybe not open access.
Identity-Concealed Authenticated Encryption from Ring Learning with Errors
2019Authenticated encryption (AE) is very suitable for a resources constrained environment for it needs less computational costs and AE has become one of the important technologies of modern communication security. Identity concealment is one of research focuses in design and analysis of current secure transport protocols (such as TLS1.3 and Google’s QUIC).
Chao Liu +3 more
openaire +1 more source
SECURITY AND PRIVACY, 2023
AbstractDue to the rapid development of mobile communication and hardware technologies, several mobile‐based web applications have gained popularity among mobile users. Mobile users can utilize these devices to access numerous services over the Internet.
Komal Pursharthi, Dheerendra Mishra
openaire +1 more source
AbstractDue to the rapid development of mobile communication and hardware technologies, several mobile‐based web applications have gained popularity among mobile users. Mobile users can utilize these devices to access numerous services over the Internet.
Komal Pursharthi, Dheerendra Mishra
openaire +1 more source
Cryptanalysis on Attribute-Based Encryption from Ring-Learning with Error (R-LWE)
2020The encouraging outcomes on the hardness of the lattice-based problem in resisting the recent quantum attacks have aroused the recent works of attribute-based encryption (ABE) schemes. In October 2014, Zhu et al. presented an increasingly proficient ABE with the hardness of ring-learning with error (R-LWE), so-called as \(ABE_{R{\text {-}}LWE}\) scheme.
Tan Soo Fun, Azman Samsudin
openaire +1 more source
2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), 2018
The Number Theoretic Transform (NTT) has been revived recently by the advent of the Ring-Learning with Errors (Ring-LWE) Homomorphic Encryption (HE) schemes. In these schemes, the NTT is used to calculate the product of high degree polynomials with multi-precision coefficients in quasilinear time.
Ahmad Al Badawi +2 more
openaire +1 more source
The Number Theoretic Transform (NTT) has been revived recently by the advent of the Ring-Learning with Errors (Ring-LWE) Homomorphic Encryption (HE) schemes. In these schemes, the NTT is used to calculate the product of high degree polynomials with multi-precision coefficients in quasilinear time.
Ahmad Al Badawi +2 more
openaire +1 more source
A Gaussian Sampler for Ring-Learning-With-Errors Scheme Reusing a Cryptographic Module
Advanced Science and Technology Letters, 2015Since the different characteristics from the PRNG (Pseudo Random Number Generator) or various deterministic devices such as arithmetic processing units, new concepts and test methods should be suggested in order to test TRNG (Ture Random Number Generator).
openaire +1 more source
2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT), 2019
In this work, we provide a complexity analysis of the trade-off between performance and security for two post-quantum key exchange cryptosystems: a protocol based on coding theory (Ouroboros) and the lattice-based ring learning with errors key exchange (RLWE).
Claudio Tellez +2 more
openaire +1 more source
In this work, we provide a complexity analysis of the trade-off between performance and security for two post-quantum key exchange cryptosystems: a protocol based on coding theory (Ouroboros) and the lattice-based ring learning with errors key exchange (RLWE).
Claudio Tellez +2 more
openaire +1 more source
2019
arXiv admin note: text overlap with arXiv:1508.01375 by other authors/ comment of the author: quotation has been added to Theorem 5 ...
openaire +1 more source
arXiv admin note: text overlap with arXiv:1508.01375 by other authors/ comment of the author: quotation has been added to Theorem 5 ...
openaire +1 more source
Blockchain-based Smart Parking System using Ring Learning With Errors based Signature
2022 6th International Conference on Cryptography, Security and Privacy (CSP), 2022Jihan Lailatul Atiqoh +2 more
openaire +1 more source
Lightweight Ring Learning With Errors Cryptographic Scheme for Secure Cloud-IoT Systems
2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT), 2023Mangala N, Eswara Reddy B, Venugopal K R
openaire +1 more source
A Certificateless Authenticated Key Exchange Protocol Based on Ring Learning with Errors
2022 IEEE 10th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), 2022Luyao Ma, Li Li, Hongfei Yang
openaire +1 more source

