Results 31 to 40 of about 243,099 (282)

Non-Commutative Ring Learning With Errors From Cyclic Algebras

open access: yes, 2020
Full version of a paper previously posted on IACR ...
Grover, Charles   +2 more
openaire   +2 more sources

Lattice-Based proof of a shuffle [PDF]

open access: yes, 2019
In this paper we present the first fully post-quantum proof of a shuffle for RLWE encryption schemes. Shuffles are commonly used to construct mixing networks (mix-nets), a key element to ensure anonymity in many applications such as electronic voting ...
Costa, Nuria   +2 more
core   +1 more source

Machine Learning-Based Models for the Estimation of the Energy Consumption in Metal Forming Processes

open access: yesMetals, 2021
This research provides an insight on the performances of machine learning (ML)-based algorithms for the estimation of the energy consumption in metal forming processes and is applied to the radial-axial ring rolling process.
Irene Mirandola   +5 more
doaj   +1 more source

A New Algorithm for Solving Ring-LPN with a Reducible Polynomial [PDF]

open access: yes, 2014
The LPN (Learning Parity with Noise) problem has recently proved to be of great importance in cryptology. A special and very useful case is the RING-LPN problem, which typically provides improved efficiency in the constructed cryptographic primitive.
Guo, Qian   +2 more
core   +1 more source

Fast Number Theoretic Transform for Ring-LWE on 8-bit AVR Embedded Processor

open access: yesSensors, 2020
In this paper, we optimized Number Theoretic Transform (NTT) and random sampling operations on low-end 8-bit AVR microcontrollers. We focused on the optimized modular multiplication with secure countermeasure (i.e., constant timing), which ensures high ...
Hwajeong Seo   +6 more
doaj   +1 more source

Anonymous Quantum Safe Construction of Three Party Authentication and Key Agreement Protocol for Mobile Devices

open access: yesIEEE Access
Once the shared secret key is established, three parties can use it for secure communication using symmetric-key encryption AES (128, 192, 256) algorithms or other cryptographic primitives.
Dharminder Chaudhary   +5 more
doaj   +1 more source

Multi-key homomorphic encryption with tightened RGSW ciphertexts without relinearization for ciphertexts product

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Most previous RLWE-based multi-key homomorphic encryptions (MKHEs) need to perform complex relinearization operations on ciphertext products to complete the evaluation of circuits of bounded polynomial depth.
Xiaoliang Che   +6 more
doaj   +1 more source

Shorter Linkable Ring Signature Based on Middle-Product Learning with Errors Problem

open access: yesThe Computer Journal, 2022
Abstract DualRing is a novel generic construction introduced by Yuen et al. (CRYPTO’21), which can transform a special kind of (Type-T*) canonical identification scheme to a ring signature scheme. Compared with the classical approaches, this method can get a shorter signature.
Hao Lin   +4 more
openaire   +1 more source

Provably weak instances of ring-LWE revisited [PDF]

open access: yes, 2016
In CRYPTO 2015, Elias, Lauter, Ozman and Stange described an attack on the non-dual decision version of the ring learning with errors problem (RLWE) for two special families of defining polynomials, whose construction depends on the modulus q that is ...
J Hoffstein   +9 more
core   +3 more sources

Home - About - Disclaimer - Privacy