Results 41 to 50 of about 302 (149)
Analysis of Error Dependencies on Newhope
Among many submissions to NIST post-quantum cryptography (PQC) project, NewHope is a promising key encapsulation mechanism (KEM) based on the Ring-Learning with errors (Ring-LWE) problem.
Minki Song +5 more
doaj +1 more source
Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols
Public key cryptography protocols, such as RSA and elliptic curve cryptography, will be rendered insecure by Shor’s algorithm when large-scale quantum computers are built.
Utsav Banerjee +2 more
doaj +1 more source
FPGA-Based Hardware Accelerator for Leveled Ring-LWE Fully Homomorphic Encryption
Fully homomorphic encryption (FHE) allows arbitrary computation on encrypted data and has great potential in privacy-preserving cloud computing and securely outsource computational tasks.
Yang Su +3 more
doaj +1 more source
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber
Single-trace attacks are a considerable threat to implementations of classic public-key schemes, and their implications on newer lattice-based schemes are still not well understood.
Mike Hamburg +7 more
doaj +1 more source
Efficient-Scheduling Parallel Multiplier-Based Ring-LWE Cryptoprocessors [PDF]
This paper presents a novel architecture for ring learning with errors (LWE) cryptoprocessors using an efficient approach in encryption and decryption operations. By scheduling multipliers to work in parallel, the encryption and decryption time are significantly reduced.
Tuy Nguyen Tan, Hanho Lee
openaire +1 more source
With the rapid advancement of quantum computing technology, traditional encryption methods are encountering unprecedented challenges in the Internet of Things (IoT), blockchain systems, and digital learning (e-learning) platforms.
Chin-Ling Chen +5 more
doaj +1 more source
Ring-LWE: Enhanced Foundations and Applications
Ring Learning With Errors assumption has become an important building block in many modern cryptographic applications, such as (fully) homomorphic encryption and post-quantum cryptosystems like the recently announced NIST CRYSTALS-Kyber public key encryption scheme.
openaire +2 more sources
ABSTRACT Rationale In this study, we applied cross‐linking mass spectrometry (XL‐MS) to characterize the oligomeric states of a PGLa/magainin 2 mixture and gain insight into the heterodimerization previously suggested in the literature. Both peptides have shown a synergistic enhancement of activity when tested in antimicrobial assays; however, the ...
Emilie Hirschler +7 more
wiley +1 more source
Multi-LFSR Architectures for BRLWE-Based Post Quantum Cryptography
The advancement in quantum computing has led to a significant progress in the development of public-key cryptosystems, referred as Post Quantum Cryptography (PQC) which has robust security to withstand both classical and quantum attacks.
Shaik Ahmadunnisa, Sudha Ellison Mathe
doaj +1 more source
Efficient Ring-LWE Encryption on 8-Bit AVR Processors [PDF]
Public-key cryptography based on the “ring-variant” of the Learning with Errors (ring-LWE) problem is both efficient and believed to remain secure in a post-quantum world. In this paper, we introduce a carefully-optimized implementation of a ring-LWE encryption scheme for 8-bit AVR processors like the ATxmega128.
Liu, Zhe +5 more
openaire +3 more sources

