Results 1 to 10 of about 2,794 (176)
The Ring-LWE Problem in Lattice-Based Cryptography: The Case of Twisted Embeddings [PDF]
Several works have characterized weak instances of the Ring-LWE problem by exploring vulnerabilities arising from the use of algebraic structures. Although these weak instances are not addressed by worst-case hardness theorems, enabling other ring ...
Jheyne N. Ortiz +4 more
doaj +4 more sources
How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption [PDF]
There exists a natural trade-off in public key encryption (PKE) schemes based on ring learning with errors (RLWE), namely: we would like a wider error distribution to increase the security, but it comes at the cost of an increased decryption failure rate
Jiabo Wang, Cong Ling
doaj +4 more sources
Obfuscating Conjunctions under Entropic Ring LWE [PDF]
We show how to securely obfuscate conjunctions, which are functions f(x[subscript 1], . . . , x[subscript n]) = ∧[subscript i∈I] y[superscript i] where I ⊆ [n] and each literal y[subscript i] is either just x[subscript i] or ¬x[subscript i] e.g., f(x ...
Zvika Brakerski +3 more
openalex +6 more sources
Ring-LWE Cryptography for the Number Theorist [PDF]
In this paper, we survey the status of attacks on the ring and polynomial learning with errors problems (RLWE and PLWE). Recent work on the security of these problems [Eisentr\"ager-Hallgren-Lauter, Elias-Lauter-Ozman-Stange] gives rise to interesting ...
Yara Elias +3 more
openalex +5 more sources
CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes [PDF]
This paper proposes a practical hybrid solution for combining and switching between three popular Ring-LWE-based FHE schemes: TFHE, B/FV and HEAAN. This is achieved by first mapping the different plaintext spaces to a common algebraic structure and then ...
Boura Christina +3 more
doaj +2 more sources
FPGA-Based Hardware Accelerator for Leveled Ring-LWE Fully Homomorphic Encryption [PDF]
Fully homomorphic encryption (FHE) allows arbitrary computation on encrypted data and has great potential in privacy-preserving cloud computing and securely outsource computational tasks.
Yang Su +3 more
doaj +2 more sources
Fast Number Theoretic Transform for Ring-LWE on 8-bit AVR Embedded Processor [PDF]
In this paper, we optimized Number Theoretic Transform (NTT) and random sampling operations on low-end 8-bit AVR microcontrollers. We focused on the optimized modular multiplication with secure countermeasure (i.e., constant timing), which ensures high ...
Hwajeong Seo +6 more
doaj +2 more sources
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT
In this work, we consider the ring- and module- variants of the LWE problem and investigate cold boot attacks on cryptographic schemes based on these problems, wherein an attacker is faced with the problem of recovering a scheme’s secret key from a noisy
Martin R. Albrecht +2 more
doaj +3 more sources
High-Secure Fingerprint Authentication System Using Ring-LWE Cryptography
This paper presents a high-secure fingerprint authentication system using ring learning with errors (ring-LWE) cryptography to protect users' fingerprint data more securely.
Tuy Nguyen Tan, Hanho Lee
doaj +2 more sources
On error distributions in ring-based LWE [PDF]
Since its introduction in 2010 by Lyubashevsky, Peikert and Regev, the ring learning with errors problem (ring-LWE) has become a popular building block for cryptographic primitives, due to its great versatility and its hardness proof consisting of a ...
Wouter Castryck +2 more
openalex +5 more sources

