Search Results - "Learning with errors"

Refine Results
  1. 1

    A comprehensive review on hardware implementations of lattice-based cryptographic schemes by Ahmadunnisa, Shaik, Mathe, Sudha Ellison

    ISSN: 1383-7621
    Published: Elsevier B.V 01.10.2025
    Published in Journal of systems architecture (01.10.2025)
    “…The rise in threats from large-scale quantum computer has driven significant advancements in the field of Post Quantum Cryptography (PQC). In this context, the…”
    Get full text
    Journal Article
  2. 2

    Highly Efficient Architecture of NewHope-NIST on FPGA using Low-Complexity NTT/INTT by Neng Zhang, Bohan Yang, Chen Chen, Shouyi Yin, Shaojun Wei, Leibo Liu

    ISSN: 2569-2925
    Published: Ruhr-Universität Bochum 01.03.2020
    “…NewHope-NIST is a promising ring learning with errors (RLWE)-based postquantum cryptography (PQC) for key encapsulation mechanisms. The performance on the…”
    Get full text
    Journal Article
  3. 3

    A Compact and High-Performance Hardware Architecture for CRYSTALS-Dilithium by Zhao, Cankun, Zhang, Neng, Wang, Hanning, Yang, Bohan, Zhu, Wenping, Li, Zhengdong, Zhu, Min, Yin, Shouyi, Wei, Shaojun, Liu, Leibo

    ISSN: 2569-2925, 2569-2925
    Published: Ruhr-Universität Bochum 19.11.2021
    “…The lattice-based CRYSTALS-Dilithium scheme is one of the three thirdround digital signature finalists in the National Institute of Standards and Technology…”
    Get full text
    Journal Article
  4. 4

    Lattice-based multi-authority ciphertext-policy attribute-based searchable encryption with attribute revocation for cloud storage by Shen, Xiajiong, Li, Xiaoran, Yin, Hongjian, Cao, Chaoyang, Zhang, Lei

    ISSN: 1389-1286, 1872-7069
    Published: Elsevier B.V 01.08.2024
    “…Multi-authority attribute-based searchable encryption (MABSE) is an flexible and efficient way to securely share and search encrypted data. Compared with…”
    Get full text
    Journal Article
  5. 5

    On the concrete hardness of Learning with Errors by Albrecht Martin R., Player Rachel, Scott Sam

    ISSN: 1862-2976, 1862-2984
    Published: De Gruyter 01.10.2015
    Published in Journal of mathematical cryptology (01.10.2015)
    “…The learning with errors (LWE) problem has become a central building block of modern cryptographic constructions. This work collects and presents hardness…”
    Get full text
    Journal Article
  6. 6

    Fast multiplication and the PLWE–RLWE equivalence for an infinite family of maximal real subfields of cyclotomic fields by Ahola, Joonas, Blanco-Chacón, Iván, Bolaños, Wilmar, Haavikko, Antti, Hollanti, Camilla, Sánchez-Ledesma, Rodrigo M.

    ISSN: 0925-1022, 1573-7586
    Published: Dordrecht Springer Nature B.V 01.08.2025
    Published in Designs, codes, and cryptography (01.08.2025)
    “…We prove the equivalence between the Ring Learning With Errors (RLWE) and the Polynomial Learning With Errors (PLWE) problems for the maximal totally real…”
    Get full text
    Journal Article
  7. 7

    Lightweight quantum-resistant image transmission based on compressive sensing by Qi, Yuning, Zhang, Ran, Bi, Jingguo, Li, Lixiang, Peng, Haipeng, Luo, Shuwen

    ISSN: 0950-7051
    Published: Elsevier B.V 15.12.2025
    Published in Knowledge-based systems (15.12.2025)
    “…With the widespread adoption and development of intelligent healthcare systems, medical images, as a critical data source, contain rich information,…”
    Get full text
    Journal Article
  8. 8

    Implementing RLWE-based Schemes Using an RSA Co-Processor by Martin R. Albrecht, Christian Hanser, Andrea Hoeller, Thomas Pöppelmann, Fernando Virdia, Andreas Wallner

    ISSN: 2569-2925
    Published: Ruhr-Universität Bochum 2019
    “…We repurpose existing RSA/ECC co-processors for (ideal) lattice-based cryptography by exploiting the availability of fast long integer multiplication. Such…”
    Get full text
    Journal Article
  9. 9

    Lattice-based public key searchable encryption with fine-grained access control for edge computing by Wang, Peng, Chen, Biwen, Xiang, Tao, Wang, Zhongming

    ISSN: 0167-739X, 1872-7115
    Published: Elsevier B.V 01.02.2022
    Published in Future generation computer systems (01.02.2022)
    “…As a bridge between cloud computing platforms and the Internet of Things (IoT) devices, edge computing provides various on-demand data services to reduce…”
    Get full text
    Journal Article
  10. 10

    Two-stage reversible data hiding in encrypted domain with public key embedding mechanism by Ke, Yan, Liu, Jia, Han, Yiliang

    ISSN: 0165-1684
    Published: Elsevier B.V 01.08.2025
    Published in Signal processing (01.08.2025)
    “…Reversible data hiding in encrypted domain (RDH-ED) can perform encryption and data embedding to simultaneously fulfill the privacy protection and access…”
    Get full text
    Journal Article
  11. 11

    When Bad News Become Good News: Towards Usable Instances of Learning with Physical Errors by Bellizia, Davide, Hoffmann, Clément, Kamel, Dina, Méaux, Pierrick, Standaert, François-Xavier

    ISSN: 2569-2925, 2569-2925
    Published: 31.08.2022
    “…Hard physical learning problems have been introduced as an alternative option to implement cryptosystems based on hard learning problems. Their high-level idea…”
    Get full text
    Journal Article
  12. 12

    HPKA: A High-Performance CRYSTALS-Kyber Accelerator Exploring Efficient Pipelining by Ni, Ziying, Khalid, Ayesha, Kundi, Dur-e-Shahwar, O'Neill, Maire, Liu, Weiqiang

    ISSN: 0018-9340, 1557-9956
    Published: New York IEEE 01.12.2023
    Published in IEEE transactions on computers (01.12.2023)
    “…CRYSTALS-Kyber (Kyber) was recently chosen as the first quantum resistant Key Encapsulation Mechanism (KEM) scheme for standardisation, after three rounds of…”
    Get full text
    Journal Article
  13. 13
  14. 14

    Lattice-based public-key encryption with equality test supporting flexible authorization in standard model by Roy, Partha Sarathi, Duong, Dung Hoang, Susilo, Willy, Sipasseuth, Arnaud, Fukushima, Kazuhide, Kiyomoto, Shinsaku

    ISSN: 0304-3975, 1879-2294
    Published: Elsevier B.V 11.09.2022
    Published in Theoretical computer science (11.09.2022)
    “…As cloud computing has developed rapidly, outsourcing data to cloud servers for remote storage has become an attractive trend. However, when cloud clients…”
    Get full text
    Journal Article
  15. 15
  16. 16

    Dynamic Multi-Key FHE in Asymmetric Key Setting From LWE by Chen, Yuling, Dong, Sen, Li, Tao, Wang, Yilei, Zhou, Huiyu

    ISSN: 1556-6013, 1556-6021
    Published: New York IEEE 2021
    “…Multi-key Fully homomorphic encryption (MFHE) schemes allow computation on the encrypted data under different keys. However, traditional multi-key FHE schemes…”
    Get full text
    Journal Article
  17. 17

    When Bad News Become Good News by Davide Bellizia, Clément Hoffmann, Dina Kamel, Pierrick Méaux, François-Xavier Standaert

    ISSN: 2569-2925
    Published: Ruhr-Universität Bochum 01.08.2022
    “…Hard physical learning problems have been introduced as an alternative option to implement cryptosystems based on hard learning problems. Their high-level idea…”
    Get full text
    Journal Article
  18. 18

    When Bad News Become Good News by Davide Bellizia, Clément Hoffmann, Dina Kamel, Pierrick Méaux, François-Xavier Standaert

    ISSN: 2569-2925
    Published: Ruhr-Universität Bochum 01.08.2022
    “…Hard physical learning problems have been introduced as an alternative option to implement cryptosystems based on hard learning problems. Their high-level idea…”
    Get full text
    Journal Article
  19. 19

    An Efficient and Parallel R-LWE Cryptoprocessor by Zhang, Yuqing, Wang, Chenghua, Kundi, Dur E. Shahwar, Khalid, Ayesha, O'Neill, Maire, Liu, Weiqiang

    ISSN: 1549-7747, 1558-3791
    Published: New York IEEE 01.05.2020
    “…Lattice-based cryptography (LBC) is a promising and efficient public key cryptography scheme whose theoretical foundation usually lies in Learning with Error…”
    Get full text
    Journal Article
  20. 20

    The polynomial learning with errors problem and the smearing condition by Babinkostova, Liljana, Chin, Ariana, Kirtland, Aaron, Nazarchuk, Vladyslav, Plotnick, Esther

    ISSN: 1862-2984, 1862-2976, 1862-2984
    Published: Berlin De Gruyter 01.01.2022
    Published in Journal of mathematical cryptology (01.01.2022)
    “…As quantum computing advances rapidly, guaranteeing the security of cryptographic protocols resistant to quantum attacks is paramount. Some leading candidate…”
    Get full text
    Journal Article