Zobrazeno 1 - 10
of 32
pro vyhledávání: '"Markus Krausz"'
Autor:
Jung Hee Cheon, Hyeongmin Choe, Julien Devevey, Tim Güneysu, Dongyeon Hong, Markus Krausz, Georg Land, Marc Möller, Damien Stehlé, MinJune Yi
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 3 (2024)
We present HAETAE (Hyperball bimodAl modulE rejecTion signAture schemE), a new lattice-based signature scheme. Like the NIST-selected Dilithium signature scheme, HAETAE is based on the Fiat-Shamir with Aborts paradigm, but our design choices target a
Externí odkaz:
https://doaj.org/article/00edd78ef6ed4367969166f49ba7861d
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 3 (2021)
BIKE is a key encapsulation mechanism that entered the third round of the NIST post-quantum cryptography standardization process. This paper presents two constant-time implementations for BIKE, one tailored for the Intel Haswell and one tailored for
Externí odkaz:
https://doaj.org/article/ba9a7009c82a4ad59a3655561fc3288e
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031313707
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::def30ed6ba3d343a525d32d2abc291df
https://doi.org/10.1007/978-3-031-31371-4_4
https://doi.org/10.1007/978-3-031-31371-4_4
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 3 (2018)
Lattice-based cryptography is one of the most promising candidates being considered to replace current public-key systems in the era of quantum computing. In 2016, Bos et al. proposed the key exchange scheme FrodoCCS, that is also a submission to the
Externí odkaz:
https://doaj.org/article/6903987b277b415d82920de5d6396622
Publikováno v:
Post-Quantum Cryptography ISBN: 9783031172335
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::114dcf74a42e5f4779c67ac4fdcae735
https://doi.org/10.1007/978-3-031-17234-2_15
https://doi.org/10.1007/978-3-031-17234-2_15
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783031092336
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::db3bc8e0bef7e0a009d0652cf3faa888
https://doi.org/10.1007/978-3-031-09234-3_41
https://doi.org/10.1007/978-3-031-09234-3_41
Publikováno v:
RAID
Recent research has revealed an ever-growing class of microarchitectural attacks that exploit speculative execution, a standard feature in modern processors. Proposed and deployed countermeasures involve a variety of compiler updates, firmware update
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4eea70f815c47a372c6ecc4d692dba68
http://arxiv.org/abs/2007.15919
http://arxiv.org/abs/2007.15919
Publikováno v:
ICECS
Lattice-based cryptography is a promising candidate and remedy in public-key cryptography in case quantum computers become feasible or a major breakthrough in solving the factorization problem or the discrete logarithm problem is achieved. Due to ong
Publikováno v:
ACM Transactions on Embedded Computing Systems; Mar2024, Vol. 23 Issue 2, p1-23, 23p
Autor:
QINGYI ZHU1 zhuqy@cqupt.edu.cn, LOKE, SENG W.2 seng.loke@deakin.edu.au, TRUJILLO-RASUA, ROLANDO2 rolando.trujillo@deakin.edu.au, JIANG, FRANK2 Frank.Jiang@deakin.edu.au, YONG XIANG2 yong.xiang@deakin.edu.au
Publikováno v:
ACM Computing Surveys. Nov2020, Vol. 52 Issue 6, p1-34. 34p.