نتایج جستجو برای: Lattice-based Cryptography

تعداد نتایج: 3032580  

Journal: :CoRR 2010
V. S. Usatyuk

This article presets a review of lattice problems. Paper contains the main eighteen problems with their reductions and referents to his cryptography application. As an example of reduction, we detail analyze connection between SVP and CVP. Moreover, we give an Ajtai theorem and demonstrate its role in lattice based cryptography.

2008
Vadim Lyubashevsky

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x

Journal: :Tatra Mountains Mathematical Publications 2014

2005
Oded Regev

In this chapter we describe some of the recent progress in lattice-based cryptography. Lattice-based cryptographic constructions hold a great promise for post-quantum cryptography, as they enjoy very strong security proofs based on worst-case hardness, relatively efficient implementations, as well as great simplicity. In addition, lattice-based cryptography is believed to be secure against quan...

2014
Jean-Claude Bajard Julien Eynard Nabil Merkiche Thomas Plantard

Lattice based cryptography is claimed as a serious candidate for post quantum cryptography, it recently became an essential tool of modern cryptography. Nevertheless, if lattice based cryptography has made theoretical progresses, its chances to be adopted in practice are still low due to the cost of the computation. If some approaches like RSA and ECC have been strongly optimized in particular ...

Journal: :IACR transactions on cryptographic hardware and embedded systems 2022

This paper presents an improved Plantard’s modular arithmetic (Plantard arithmetic) tailored for Lattice-Based Cryptography (LBC). Based on the Plantard arithmetic, we present faster implementations of two LBC schemes, Kyber and NTTRU, running Cortex-M4. The intrinsic advantage is that one multiplication can be saved from a constant. However, original not very practical in schemes because limit...

Journal: :IACR Cryptology ePrint Archive 2017
Nabil Alkeilani Alkadri Johannes A. Buchmann Rachid El Bansarkhani Juliane Krämer

Selecting parameters in lattice-based cryptography is a challenging task, which is essentially accomplished using one of two approaches. The first (very common) approach is to derive parameters assuming that the desired security level is equivalent to the bit hardness of the underlying lattice problem, ignoring the gap implied by available security reductions. The second (barely used) approach ...

Journal: :CoRR 2016
Maheswara Rao Valluri

Xinyu et al. proposed a public key exchange protocol, which is based on the NTRU-lattice based cryptography. In this paper, we show how Xinyu et al.’s NTRU-KE: A lattice based key exchange protocol can be broken, under the assumption that a man-in-the middle attack is used for extracting private keys of users who participate in the key exchange protocol.

Journal: :IACR Cryptology ePrint Archive 2014
Robert Fitzpatrick Christian H. Bischof Johannes A. Buchmann Özgür Dagdelen Florian Göpfert Artur Mariano Bo-Yin Yang

The area of lattice-based cryptography is growing ever-more prominent as a paradigm for quantum-resistant cryptography. One of the most important hard problem underpinning the security of latticebased cryptosystems is the shortest vector problem (SVP). At present, two approaches dominate methods for solving instances of this problem in practice: enumeration and sieving. In 2010, Micciancio and ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید