Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Tobias Oder"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 3 (2020)
With the NIST post-quantum standardization competition entering the second round, the interest in practical implementation results of the remaining NIST candidates is steadily growing. Especially implementations on embedded devices are often not prot
Externí odkaz:
https://doaj.org/article/8953d93a7a7a44fa8e4f7f4656a49275
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 3 (2018)
Lattice-based cryptography is one of the most promising candidates being considered to replace current public-key systems in the era of quantum computing. In 2016, Bos et al. proposed the key exchange scheme FrodoCCS, that is also a submission to the
Externí odkaz:
https://doaj.org/article/6903987b277b415d82920de5d6396622
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 1 (2018)
During the last years public-key encryption schemes based on the hardness of ring-LWE have gained significant popularity. For real-world security applications assuming strong adversary models, a number of practical issues still need to be addressed.
Externí odkaz:
https://doaj.org/article/1ab867b9681343758c2b3881d27248fe
Publikováno v:
Advanced Boolean Techniques ISBN: 9783030203221
With the call for new cryptographic standards that resist powerful quantum computers, lattice-based cryptography has gained significant popularity. To become viable replacements for contemporary cryptography, lattice-based encryption and key-exchange
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::58b96c1669bb3336f438b026ff7d4d14
https://doi.org/10.1007/978-3-030-20323-8_2
https://doi.org/10.1007/978-3-030-20323-8_2
Autor:
Tim Güneysu, Tobias Oder
Publikováno v:
Progress in Cryptology – LATINCRYPT 2017 ISBN: 9783030252823
LATINCRYPT
LATINCRYPT
Lattice-based cryptography is one of the most promising candidates being considered to replace current public-key systems in the era of quantum computing. In 2016 Alkim, Ducas, Poppelmann, and Schwabe proposed the lattice-based key exchange scheme Ne
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7aed50b08450ebd00ac77e2cb16132e8
https://doi.org/10.1007/978-3-030-25283-0_7
https://doi.org/10.1007/978-3-030-25283-0_7
Publikováno v:
Public-Key Cryptography – PKC 2019-22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Public-Key Cryptography – PKC 2019
Public-Key Cryptography – PKC 2019 ISBN: 9783030172589
Public Key Cryptography (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Public-Key Cryptography – PKC 2019
Public-Key Cryptography – PKC 2019 ISBN: 9783030172589
Public Key Cryptography (2)
With the rising popularity of lattice-based cryptography, the Learning with Errors (LWE) problem has emerged as a fundamental core of numerous encryption and key exchange schemes. Many LWE-based schemes have in common that they require sampling from
Publikováno v:
ICECS
Lattice-based cryptography is a promising candidate and remedy in public-key cryptography in case quantum computers become feasible or a major breakthrough in solving the factorization problem or the discrete logarithm problem is achieved. Due to ong
Publikováno v:
CS2@HiPEAC
Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems-CS2 18
Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems -CS2 '18
Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems
Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems-CS2 18
Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems -CS2 '18
Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems
The future advent of quantum computer pushes for the design and implementation of public-key cryptosystems capable of resisting quantum attacks. Lattice-based cryptography, especially when implemented over ideal lattices, is one of the most promising
Autor:
Felipe Valencia, Tobias Oder, Tim Güneysu, Ayesha Khalid, Maire O' Neill, Francesco Regazzoni
Publikováno v:
Proceedings of the 2018 on Great Lakes Symposium on VLSI -GLSVLSI '18
Proceedings of the 2018 on Great Lakes Symposium on VLSI-GLSVLSI 18
ACM Great Lakes Symposium on VLSI
Khalid, A, O’ Neill, M, Oder, T, Güneysu, T, Valencia, F & Regazzoni, F 2018, Physical protection of lattice-Based cryptography-Challenges and solutions-. in GLSVLSI 2018: Proceedings of the 2018 Great Lakes Symposium on VLSI . Association for Computing Machinery, pp. 365-370, 28th Great Lakes Symposium on VLSI, GLSVLSI 2018, Chicago, United States, 23/05/2018 . https://doi.org/10.1145/3194554.3194616
Proceedings of the 2018 on Great Lakes Symposium on VLSI-GLSVLSI 18
ACM Great Lakes Symposium on VLSI
Khalid, A, O’ Neill, M, Oder, T, Güneysu, T, Valencia, F & Regazzoni, F 2018, Physical protection of lattice-Based cryptography-Challenges and solutions-. in GLSVLSI 2018: Proceedings of the 2018 Great Lakes Symposium on VLSI . Association for Computing Machinery, pp. 365-370, 28th Great Lakes Symposium on VLSI, GLSVLSI 2018, Chicago, United States, 23/05/2018 . https://doi.org/10.1145/3194554.3194616
The impending realization of scalable quantum computers will have a significant impact on today’s security infrastructure. With the advent of powerful quantum computers public key cryptographic schemes will become vulnerable to Shor’s quantum alg
Publikováno v:
ACM Transactions on Embedded Computing Systems
With respect to performance, asymmetric code-based cryptography based on binary Goppa codes has been reported as a highly interesting alternative to RSA and ECC. A major drawback is still the large keys in the range between 50 and 100KB that prevente