Results 1 to 10 of about 2,794 (176)

The Ring-LWE Problem in Lattice-Based Cryptography: The Case of Twisted Embeddings [PDF]

open access: goldEntropy, 2021
Several works have characterized weak instances of the Ring-LWE problem by exploring vulnerabilities arising from the use of algebraic structures. Although these weak instances are not addressed by worst-case hardness theorems, enabling other ring ...
Jheyne N. Ortiz   +4 more
doaj   +4 more sources

How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption [PDF]

open access: goldEntropy, 2021
There exists a natural trade-off in public key encryption (PKE) schemes based on ring learning with errors (RLWE), namely: we would like a wider error distribution to increase the security, but it comes at the cost of an increased decryption failure rate
Jiabo Wang, Cong Ling
doaj   +4 more sources

Obfuscating Conjunctions under Entropic Ring LWE [PDF]

open access: gold, 2016
We show how to securely obfuscate conjunctions, which are functions f(x[subscript 1], . . . , x[subscript n]) = ∧[subscript i∈I] y[superscript i] where I ⊆ [n] and each literal y[subscript i] is either just x[subscript i] or ¬x[subscript i] e.g., f(x ...
Zvika Brakerski   +3 more
openalex   +6 more sources

Ring-LWE Cryptography for the Number Theorist [PDF]

open access: green, 2016
In this paper, we survey the status of attacks on the ring and polynomial learning with errors problems (RLWE and PLWE). Recent work on the security of these problems [Eisentr\"ager-Hallgren-Lauter, Elias-Lauter-Ozman-Stange] gives rise to interesting ...
Yara Elias   +3 more
openalex   +5 more sources

CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes [PDF]

open access: goldJournal of Mathematical Cryptology, 2020
This paper proposes a practical hybrid solution for combining and switching between three popular Ring-LWE-based FHE schemes: TFHE, B/FV and HEAAN. This is achieved by first mapping the different plaintext spaces to a common algebraic structure and then ...
Boura Christina   +3 more
doaj   +2 more sources

FPGA-Based Hardware Accelerator for Leveled Ring-LWE Fully Homomorphic Encryption [PDF]

open access: goldIEEE Access, 2020
Fully homomorphic encryption (FHE) allows arbitrary computation on encrypted data and has great potential in privacy-preserving cloud computing and securely outsource computational tasks.
Yang Su   +3 more
doaj   +2 more sources

Fast Number Theoretic Transform for Ring-LWE on 8-bit AVR Embedded Processor [PDF]

open access: yesSensors, 2020
In this paper, we optimized Number Theoretic Transform (NTT) and random sampling operations on low-end 8-bit AVR microcontrollers. We focused on the optimized modular multiplication with secure countermeasure (i.e., constant timing), which ensures high ...
Hwajeong Seo   +6 more
doaj   +2 more sources

Cold Boot Attacks on Ring and Module LWE Keys Under the NTT

open access: diamondTransactions on Cryptographic Hardware and Embedded Systems, 2018
In this work, we consider the ring- and module- variants of the LWE problem and investigate cold boot attacks on cryptographic schemes based on these problems, wherein an attacker is faced with the problem of recovering a scheme’s secret key from a noisy
Martin R. Albrecht   +2 more
doaj   +3 more sources

High-Secure Fingerprint Authentication System Using Ring-LWE Cryptography

open access: goldIEEE Access, 2019
This paper presents a high-secure fingerprint authentication system using ring learning with errors (ring-LWE) cryptography to protect users' fingerprint data more securely.
Tuy Nguyen Tan, Hanho Lee
doaj   +2 more sources

On error distributions in ring-based LWE [PDF]

open access: bronze, 2016
Since its introduction in 2010 by Lyubashevsky, Peikert and Regev, the ring learning with errors problem (ring-LWE) has become a popular building block for cryptographic primitives, due to its great versatility and its hardness proof consisting of a ...
Wouter Castryck   +2 more
openalex   +5 more sources

Home - About - Disclaimer - Privacy