Results 31 to 40 of about 2,659 (196)

Ring Learning With Errors: A crossroads between postquantum cryptography, machine learning and number theory [PDF]

open access: yes, 2020
The present survey reports on the state of the art of the different cryptographic functionalities built upon the ring learning with errors problem and its interplay with several classical problems in algebraic number theory.
Chacón, Iván Blanco
core   +2 more sources

A Toolkit for Ring-LWE Cryptography [PDF]

open access: yes, 2013
Recent advances in lattice cryptography, mainly stemming from the development of ring-based primitives such as ring-LWE, have made it possible to design cryptographic schemes whose efficiency is competitive with that of more traditional number-theoretic ones, along with entirely new applications like fully homomorphic encryption.
Lyubashevsky, Vadim   +2 more
openaire   +2 more sources

Compact Ring-LWE Cryptoprocessor [PDF]

open access: yes, 2014
In this paper we propose an efficient and compact processor for a ring-LWE based encryption scheme. We present three optimizations for the Number Theoretic Transform NTT used for polynomial multiplication: we avoid pre-processing in the negative wrapped convolution by merging it with the main algorithm, we reduce the fixed computation cost of the ...
Sinha Roy, Sujoy   +4 more
openaire   +2 more sources

Polar coding for Ring-LWE-based public key encryption

open access: yesCryptography and Communications, 2022
AbstractThe ring learning with errors (RLWE) problem can be used to construct efficient post-quantum public key encryption schemes. An error distribution, normally a Gaussian-like distribution, is involved in the RLWE problem. In this work we focus on using polar codes to alleviate a natural trade-off present in RLWE public key encryption schemes ...
Jiabo Wang, Cong Ling
openaire   +1 more source

Provably Weak Instances of Ring-LWE [PDF]

open access: yes, 2015
24 pages including computer code, minor modifications and typos ...
Elias, Yara   +3 more
openaire   +2 more sources

Cold Boot Attacks on Ring and Module LWE Keys Under the NTT

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
In this work, we consider the ring- and module- variants of the LWE problem and investigate cold boot attacks on cryptographic schemes based on these problems, wherein an attacker is faced with the problem of recovering a scheme’s secret key from a noisy
Martin R. Albrecht   +2 more
doaj   +1 more source

Discretisation and Product Distributions in Ring-LWE

open access: yesJournal of Mathematical Cryptology, 2020
A statistical framework applicable to Ring-LWE was outlined by Murphy and Player (IACR eprint 2019/452). Its applicability was demonstrated with an analysis of the decryption failure probability for degree-1 and degree-2 ciphertexts in the homomorphic ...
Murphy Sean, Player Rachel
doaj   +1 more source

On error distributions in ring-based LWE [PDF]

open access: yes, 2016
Since its introduction in 2010 by Lyubashevsky, Peikert and Regev, the ring learning with errors problem (ring-LWE) has become a popular building block for cryptographic primitives, due to its great versatility and its hardness proof consisting of a ...
Castryck, Wouter   +2 more
core   +3 more sources

Efficient Software Implementation of Ring-LWE Encryption [PDF]

open access: yesDesign, Automation & Test in Europe Conference & Exhibition (DATE), 2015, 2015
© 2015 EDAA. Present-day public-key cryptosystems such as RSA and Elliptic Curve Cryptography (ECC) will become insecure when quantum computers become a reality. This paper presents the new state of the art in efficient software implementations of a post-quantum secure public-key encryption scheme based on the ring-LWE problem.
De Clercq, Ruan   +3 more
openaire   +2 more sources

On Advances of Lattice-Based Cryptographic Schemes and Their Implementations

open access: yesCryptography, 2022
Lattice-based cryptography is centered around the hardness of problems on lattices. A lattice is a grid of points that stretches to infinity. With the development of quantum computers, existing cryptographic schemes are at risk because the underlying ...
Harshana Bandara   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy