Results 31 to 40 of about 2,794 (176)

On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL [PDF]

open access: yes, 2017
We present novel variants of the dual-lattice attack against LWE in the presence of an unusually short secret. These variants are informed by recent progress in BKW-style algorithms for solving LWE.
Albrecht, Martin
core   +5 more sources

Efficient Batch Fully Homomorphic Encryption with a Shorter Key from Ring-LWE

open access: yesApplied Sciences, 2022
Fully homomorphic encryption allows users to use the computing resources of cloud servers for the computation of encrypted data without worrying about data leakage.
Yuyue Chen, Ruwei Huang, Bo Yang
doaj   +1 more source

Consortium Blockchain Data Sharing Scheme Using Lattice Ciphertext Policy Attribute-Based Encryption [PDF]

open access: yesJisuanji gongcheng, 2023
In the process of data sharing, problems of data leakage and trust crisis can arise, and with the emergence of quantum computers, the threat to traditional encryption algorithms is greater.
Lingyun ZHANG, Yuling CHEN
doaj   +1 more source

Ring Learning With Errors: A crossroads between postquantum cryptography, machine learning and number theory [PDF]

open access: yes, 2020
The present survey reports on the state of the art of the different cryptographic functionalities built upon the ring learning with errors problem and its interplay with several classical problems in algebraic number theory.
Chacón, Iván Blanco
core   +2 more sources

Provably weak instances of ring-LWE revisited [PDF]

open access: yes, 2016
In CRYPTO 2015, Elias, Lauter, Ozman and Stange described an attack on the non-dual decision version of the ring learning with errors problem (RLWE) for two special families of defining polynomials, whose construction depends on the modulus q that is ...
J Hoffstein   +9 more
core   +3 more sources

Analysis of Error Dependencies on Newhope

open access: yesIEEE Access, 2020
Among many submissions to NIST post-quantum cryptography (PQC) project, NewHope is a promising key encapsulation mechanism (KEM) based on the Ring-Learning with errors (Ring-LWE) problem.
Minki Song   +5 more
doaj   +1 more source

Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Public key cryptography protocols, such as RSA and elliptic curve cryptography, will be rendered insecure by Shor’s algorithm when large-scale quantum computers are built.
Utsav Banerjee   +2 more
doaj   +1 more source

Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Single-trace attacks are a considerable threat to implementations of classic public-key schemes, and their implications on newer lattice-based schemes are still not well understood.
Mike Hamburg   +7 more
doaj   +1 more source

Post-quantum cryptographic hardware primitives [PDF]

open access: yes, 2020
The development and implementation of post-quantum cryptosystems have become a pressing issue in the design of secure computing systems, as general quantum computers have become more feasible in the last two years.
Agrawal, Rashmi   +3 more
core  

Attacks on the Search-RLWE problem with small errors [PDF]

open access: yes, 2017
The Ring Learning-With-Errors (RLWE) problem shows great promise for post-quantum cryptography and homomorphic encryption. We describe a new attack on the non-dual search RLWE problem with small error widths, using ring homomorphisms to finite fields and
Chen, Hao   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy