Zobrazeno 1 - 10
of 175
pro vyhledávání: '"Ideal Lattices"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Victor Y. Kadykov, Alla B. Levina
Publikováno v:
Безопасность информационных технологий, Vol 28, Iss 2, Pp 107-117 (2021)
Today special attention is paid to homomorphic encryption in the field of information security. Systems of homomorphic encryption represent such systems that allow arbitrary operations over ciphertext that are homomorphic to algebraic operations with
Externí odkaz:
https://doaj.org/article/c07b08fb97d7458ea7b50d5d43169642
Publikováno v:
IEEE Access, Vol 8, Pp 206581-206591 (2020)
With the development of the Vehicular Ad-Hoc Network (VANET), protecting user privacy while ensuring security has become an immense challenge. A ring signature has the characteristics of no manager and unconditional anonymity, which can substantially
Externí odkaz:
https://doaj.org/article/0970b4fcf32449c1bb3dcdc5b8e43123
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 3 (2020)
With the NIST post-quantum standardization competition entering the second round, the interest in practical implementation results of the remaining NIST candidates is steadily growing. Especially implementations on embedded devices are often not prot
Externí odkaz:
https://doaj.org/article/8953d93a7a7a44fa8e4f7f4656a49275
Publikováno v:
Tongxin xuebao, Vol 39, Pp 128-135 (2018)
Based on the small key size and high encryption efficiency on ideal lattices,a privacy-preserving attribute-based encryption scheme on ideal lattices was proposed,which could support flexible access policies and privacy protection for the users.In th
Externí odkaz:
https://doaj.org/article/a85f06d19744438494f95560b9aa2349
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 1 (2018)
During the last years public-key encryption schemes based on the hardness of ring-LWE have gained significant popularity. For real-world security applications assuming strong adversary models, a number of practical issues still need to be addressed.
Externí odkaz:
https://doaj.org/article/1ab867b9681343758c2b3881d27248fe
Publikováno v:
ASIACRYPT 2022-28th International Conference on the Theory and Application of Cryptology and Information Security
ASIACRYPT 2022-28th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2022, Taipei, Taiwan, Taiwan. pp.677-708, ⟨10.1007/978-3-031-22969-5_23⟩
Advances in Cryptology – ASIACRYPT 2022 ISBN: 9783031229688
ASIACRYPT 2022-28th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2022, Taipei, Taiwan, Taiwan. pp.677-708, ⟨10.1007/978-3-031-22969-5_23⟩
Advances in Cryptology – ASIACRYPT 2022 ISBN: 9783031229688
International audience; In 2020, Bernard and Roux-Langlois introduced the Twisted-PHS algorithm to solve Approx-Svp for ideal lattices on any number field, based on the PHS algorithm by Pellet-Mary, Hanrot and Stehlé. They performed experiments for
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b4b626e7248b6971cdf352ca02444600
https://hal.science/hal-04028180/document
https://hal.science/hal-04028180/document
Autor:
BAYER-FLUCKIGER, Eva, MACIAK, Piotr
Publikováno v:
Journal de Théorie des Nombres de Bordeaux, 2015 Jan 01. 27(3), 689-697.
Externí odkaz:
https://www.jstor.org/stable/26274010