On Advances of Lattice-Based Cryptographic Schemes and Their Implementations

نویسندگان

چکیده

Lattice-based cryptography is centered around the hardness of problems on lattices. A lattice a grid points that stretches to infinity. With development quantum computers, existing cryptographic schemes are at risk because underlying mathematical can, in theory, be easily solved by computers. Since lattice-based hard even promising foundation for future schemes. In this paper, we focus public-key encryption This survey presents current status and discusses implementations. Our main learning with errors problem (LWE problem) its plain implementations variants special algebraic structures such as ring-based discussed. Additionally, describe class functions called trapdoors their applications.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptographic schemes based on elliptic curve pairings

Cryptographic Schemes based on Elliptic Curve Pairings: Contributions to Public Key Cryptography and Key Agreement Protocols This thesis introduces the concept of certificateless public key cryptography (CLPKC). Elliptic curve pairings are then used to make concrete CL-PKC schemes and are also used to make other efficient key agreement protocols. CL-PKC can be viewed as a model for the use of p...

متن کامل

the impact of attending efl classes on the level of depression of iranian female learners and their attributional complexity

می توان گفت واقعیت چند لایه ا ی کلاس های زبان انگلیسی بسیار حائز اهمیت است، زیرا عواطف و بینش های زبان آموزان تحت تاثیر قرار می گیرد. در پژوهش پیش رو، گفته می شود که دبیران با در پیش گرفتن رویکرد فرا-انسانگرایی ، قادرند در زندگی دانش آموزانشان نقش مهمی را ایفا سازند. بر اساس گفته ی ویلیامز و بردن (2000)، برای کرل راجرز، یکی از بنیان گذاران رویکرد انسانگرایی ، یادگیری بر مبنای تجربه، نوعی از یاد...

Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives

The present survey deals with the recent research in side channel analysis and related attacks on implementations of cryptographic primitives. The focus is on software contermeasures for primitives built around algebraic groups. Many countermeasures are described, together with their extent of applicability, and their weaknesses. Some suggestions are made, conclusion are drawn, some directions ...

متن کامل

On Cryptographic Schemes Based on Discrete Logarithms and Factoring

At CRYPTO 2003, Rubin and Silverberg introduced the concept of torus-based cryptography over a finite field. We extend their setting to the ring of integers modulo N . We so obtain compact representations for cryptographic systems that base their security on the discrete logarithm problem and the factoring problem. This results in smaller key sizes and substantial savings in memory and bandwidt...

متن کامل

leadership styles of tefl instructors at gilan university and their effects on the students attitudes and motivation

the subjects of the study are only the tefl teachers and students at gilan university. to obtain the desired data, a questionnaire which was based on the theories and disecussions gathered, was used as the main data gathering instrument. to determine the degree of relationship between variables, covariance and pearson product moment correlation coefficient were the formulas applied. the data we...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cryptography

سال: 2022

ISSN: ['2410-387X']

DOI: https://doi.org/10.3390/cryptography6040056