Zobrazeno 1 - 10
of 2 080
pro vyhledávání: '"Lattice-based cryptography"'
Publikováno v:
Discover Internet of Things, Vol 4, Iss 1, Pp 1-14 (2024)
Abstract This paper presents comparative analysis of lattice-based cryptographic schemes, focusing on their runtime and memory performance to evaluate their suitability for secure IoT communications. Specifically, analyzing FrodoKEM, Kyber, and sntru
Externí odkaz:
https://doaj.org/article/67989c8c9cf64e2187575db2d9222d48
Publikováno v:
Digital Communications and Networks, Vol 10, Iss 4, Pp 989-1000 (2024)
The Internet of Things (IoT) has taken the interconnected world by storm. Due to their immense applicability, IoT devices are being scaled at exponential proportions worldwide. But, very little focus has been given to securing such devices. As these
Externí odkaz:
https://doaj.org/article/c02c63cd701d425b98abbe3eb3531596
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-22 (2024)
Abstract Since the advent of Bitcoin, cryptocurrencies have gained substantial popularity, and crypto wallets have evolved into the predominant tool for safeguarding and managing cryptographic keys to access cryptocurrency funds. Deterministic wallet
Externí odkaz:
https://doaj.org/article/8f10e53308444ffebbfc2918bc591151
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-18 (2024)
Abstract Lattice-based digital signature has become one of the widely recognized post-quantum algorithms because of its simple algebraic operation, rich mathematical foundation and worst-case security, and also an important tool for constructing cryp
Externí odkaz:
https://doaj.org/article/c4485b61c0fc40289a5dae6c286d946d
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 3 (2024)
Number Theoretic Transform (NTT) has been widely used in accelerating computations in lattice-based cryptography. However, attackers can potentially launch power analysis targeting the NTT because it is one of the most time-consuming parts of the imp
Externí odkaz:
https://doaj.org/article/1a186f5b4d3b47e985432be5ccb7ea5d
Autor:
Jung Hee Cheon, Hyeongmin Choe, Julien Devevey, Tim Güneysu, Dongyeon Hong, Markus Krausz, Georg Land, Marc Möller, Damien Stehlé, MinJune Yi
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 3 (2024)
We present HAETAE (Hyperball bimodAl modulE rejecTion signAture schemE), a new lattice-based signature scheme. Like the NIST-selected Dilithium signature scheme, HAETAE is based on the Fiat-Shamir with Aborts paradigm, but our design choices target a
Externí odkaz:
https://doaj.org/article/00edd78ef6ed4367969166f49ba7861d
Publikováno v:
Journal of Mathematical Cryptology, Vol 18, Iss 1, Pp 84-93 (2024)
We address the problem of user fast revocation in the lattice-based Ciphertext Policy Attribute-Based Encryption (CP-ABE) by extending the scheme originally introduced by Zhang and Zhang [Zhang J, Zhang Z. A ciphertext policy attribute-based encrypti
Externí odkaz:
https://doaj.org/article/88d4d4309da343049c8a0f81dacae116
Autor:
Arman Ahmad, S. Jagatheswari
Publikováno v:
IEEE Access, Vol 12, Pp 157247-157259 (2024)
Rapid advancement in Internet of Things(IoT) changes the way people work and live deliberately. Medical IoT (MIoT) is a highly significant application in the world of IoT, allowing the user to communicate with smart medical devices with the help of a
Externí odkaz:
https://doaj.org/article/f36537f0452e459481f8aa36dd2ce803
Autor:
Shaik Ahmadunnisa, Sudha Ellison Mathe
Publikováno v:
IEEE Access, Vol 12, Pp 96258-96272 (2024)
The advancement in quantum computing has led to a significant progress in the development of public-key cryptosystems, referred as Post Quantum Cryptography (PQC) which has robust security to withstand both classical and quantum attacks. Lattice-base
Externí odkaz:
https://doaj.org/article/bec4468aea55464298c4ac7acac7906b
Publikováno v:
IEEE Access, Vol 12, Pp 52911-52921 (2024)
Fully homomorphic encryption (FHE) provides a solution to privacy-preserving applications because of its ability to perform computations on encrypted data without exposing raw data. However, FHE suffers from implementation bottlenecks owing to the la
Externí odkaz:
https://doaj.org/article/49722dc4c40c4c1f92ad79253f511ce6