Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








3 Hits in 5.4 sec

A Practical View of the State-of-the-Art of Lattice-Based Cryptanalysis

Artur Mariano, Thijs Laarhoven, Fabio Correia, Manuel Rodrigues, Gabriel Falcao
2017 IEEE Access  
ACKNOWLEDGMENTS Artur Mariano thanks HiPEAC network for a collaboration grant awarded to visit Gabriel Falcão in late 2016, when the write up of this paper started.  ...  This is particularly useful when e.g. outsourcing sensitive computations on private data to a cloud server.  ...  In contrast to the lattice challenge, where only a reasonably long approximate shortest vector was needed to solve a challenge, the SVP challenge 13 focused on pure SVP solvers, by asking for (almost)  ... 
doi:10.1109/access.2017.2748179 fatcat:4duwvkbsc5cndecry6y2zynvvm

Public Key Cryptography on Hardware Platforms: Design and Analysis of Elliptic Curve and Lattice-based Cryptoprocessors

Sujoy Sinha Roy
2017 Zenodo  
Aiming to secure resource-constrained connected devices, we design a lightweight elliptic-curve coprocessor for a 283-bit Koblitz curve, which offers 140-bit security.  ...  For efficient polynomial multiplication, we apply the number theoretic transform.  ...  A.2 Hardware architecture We use these optimizations to design a high-speed and pipelined scalar conversion architecture. The architecture is described in details our publication  ... 
doi:10.5281/zenodo.2643389 fatcat:sozmpjtc3jbddpgdqa7cic24k4

Secure Session Framework: An Identity-based Cryptographic Key Agreement and Signature Protocol

Christian Schridde, Mathematik Und Informatik, Freisleben, Bernd (Prof. Dr,)
2011
This property makes it a perfect tool for modern electronic communication, because all involved identities and endpoint addresses (e.g.  ...  This independence allows each participating security domain to set up and maintain its own key generator. They are not forced to agree on a common setup or a common secret anymore.  ...  Such short vectors can be found, for example, with the LLL-Algorithm [73] that runs in polynomial time.  ... 
doi:10.17192/z2010.0472 fatcat:5xzikhgoqjhcporqtny5nhxr4a