Results 41 to 50 of about 2,794 (176)
A Subfield Lattice Attack on Overstretched NTRU Assumptions:Cryptanalysis of Some FHE and Graded Encoding Schemes [PDF]
International ...
A Ferraguti +37 more
core +5 more sources
Learning with Errors is easy with quantum samples
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography.
Grilo, Alex B. +2 more
core +2 more sources
Towards a Ring Analogue of the Leftover Hash Lemma
The leftover hash lemma (LHL) is used in the analysis of various lattice-based cryptosystems, such as the Regev and Dual-Regev encryption schemes as well as their leakage-resilient counterparts. The LHL does not hold in the ring setting, when the ring is
Dachman-Soled Dana +3 more
doaj +1 more source
With the rapid advancement of quantum computing technology, traditional encryption methods are encountering unprecedented challenges in the Internet of Things (IoT), blockchain systems, and digital learning (e-learning) platforms.
Chin-Ling Chen +5 more
doaj +1 more source
Additively homomorphic ring-LWE masking [PDF]
In this paper, we present a new masking scheme for ring LWE decryption. Our scheme exploits the additively-homomorphic property of the existing ring-LWE encryption schemes and computes an additive-mask as an encryption of a random message.
de Clercq, Ruan +4 more
core +1 more source
Does a Small Country Have Meaningful Regional Personality Differences? The Case of Estonia
ABSTRACT Background Regional differences in the Big Five personality domains have been observed in several countries at different geographical granularities, often correlating with regional political, economic, social, and health (PESH) indicators.
Ling Xu +6 more
wiley +1 more source
Multi-LFSR Architectures for BRLWE-Based Post Quantum Cryptography
The advancement in quantum computing has led to a significant progress in the development of public-key cryptosystems, referred as Post Quantum Cryptography (PQC) which has robust security to withstand both classical and quantum attacks.
Shaik Ahmadunnisa, Sudha Ellison Mathe
doaj +1 more source
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley +1 more source
A Lightweight McEliece Cryptosystem Co-processor Design [PDF]
Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction algorithms.
Agrawal, Rashmi +3 more
core +1 more source
An efficient full dynamic group signature scheme over ring
The group signature scheme is an important primitive in cryptography, it allows members in a group to generate signatures anonymously on behalf of the whole group.
Yiru Sun, Yanyan Liu, Bo Wu
doaj +1 more source

