Suchergebnisse - "ring learning with errors"

  1. 1

    Highly Efficient Architecture of NewHope-NIST on FPGA using Low-Complexity NTT/INTT von Neng Zhang, Bohan Yang, Chen Chen, Shouyi Yin, Shaojun Wei, Leibo Liu

    ISSN: 2569-2925
    Veröffentlicht: Ruhr-Universität Bochum 01.03.2020
    “… NewHope-NIST is a promising ring learning with errors (RLWE)-based postquantum cryptography (PQC) for key encapsulation mechanisms. The performance on the …”
    Volltext
    Journal Article
  2. 2

    Lightweight quantum-resistant image transmission based on compressive sensing von Qi, Yuning, Zhang, Ran, Bi, Jingguo, Li, Lixiang, Peng, Haipeng, Luo, Shuwen

    ISSN: 0950-7051
    Veröffentlicht: Elsevier B.V 15.12.2025
    Veröffentlicht in Knowledge-based systems (15.12.2025)
    “… With the widespread adoption and development of intelligent healthcare systems, medical images, as a critical data source, contain rich information, …”
    Volltext
    Journal Article
  3. 3

    An Efficient and Parallel R-LWE Cryptoprocessor von Zhang, Yuqing, Wang, Chenghua, Kundi, Dur E. Shahwar, Khalid, Ayesha, O'Neill, Maire, Liu, Weiqiang

    ISSN: 1549-7747, 1558-3791
    Veröffentlicht: New York IEEE 01.05.2020
    “… Lattice-based cryptography (LBC) is a promising and efficient public key cryptography scheme whose theoretical foundation usually lies in Learning with Error …”
    Volltext
    Journal Article
  4. 4

    Quantum-safe three-party lattice based authenticated key agreement protocol for mobile devices von Rewal, Purva, Singh, Mrityunjay, Mishra, Dheerendra, Pursharthi, Komal, Mishra, Ankita

    ISSN: 2214-2126
    Veröffentlicht: Elsevier Ltd 01.06.2023
    Veröffentlicht in Journal of information security and applications (01.06.2023)
    “… Mobile-based web apps have gained popularity among phone devices because of the rapid advancement of mobile communication and equipment capabilities. Users may …”
    Volltext
    Journal Article
  5. 5

    Configurable Encryption and Decryption Architectures for CKKS-Based Homomorphic Encryption von Lee, Jaehyeok, Duong, Phap Ngoc, Lee, Hanho

    ISSN: 1424-8220, 1424-8220
    Veröffentlicht: Basel MDPI AG 24.08.2023
    Veröffentlicht in Sensors (Basel, Switzerland) (24.08.2023)
    “… With the increasing number of edge devices connecting to the cloud for storage and analysis, concerns about security and data privacy have become more …”
    Volltext
    Journal Article
  6. 6

    A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices von Kumari, Swati, Singh, Maninder, Singh, Raman, Tewari, Hitesh

    ISSN: 1389-1286, 1872-7069
    Veröffentlicht: Amsterdam Elsevier B.V 09.11.2022
    Veröffentlicht in Computer networks (Amsterdam, Netherlands : 1999) (09.11.2022)
    “… The Internet of Things (IoT) introduces an active connection between smart devices for revolutionizing our modern lives in this world. But, IoT devices often …”
    Volltext
    Journal Article
  7. 7

    Consortium Blockchain Data Sharing Scheme Using Lattice Ciphertext Policy Attribute-Based Encryption von Lingyun ZHANG, Yuling CHEN

    ISSN: 1000-3428
    Veröffentlicht: Editorial Office of Computer Engineering 15.11.2023
    Veröffentlicht in Ji suan ji gong cheng (15.11.2023)
    “… In the process of data sharing, problems of data leakage and trust crisis can arise, and with the emergence of quantum computers, the threat to traditional …”
    Volltext
    Journal Article
  8. 8

    A Lightweight and Efficient Encryption/Decryption Coprocessor for RLWE-Based Cryptography von Yang, Yushu, Wang, Zihang, Wang, Jianfei, Hou, Jia, Su, Yang, Yang, Chen

    ISSN: 1549-7747, 1558-3791
    Veröffentlicht: New York IEEE 01.12.2024
    “… Lattice-based cryptography has experienced significant advancements in recent years due to its versatility and simplicity. The ring learning with errors (RLWE) …”
    Volltext
    Journal Article
  9. 9

    Privacy Preservation for Cloud-Edge-Collaborative Energy Management System Using Post-Quantum Homomorphic Encryption von Jiang, Cheng, Li, Xue, Du, Dajun, Qian, Hong, Wen, Mi, Wu, Lei, Findeisen, Rolf

    ISSN: 1949-3053, 1949-3061
    Veröffentlicht: Piscataway IEEE 01.07.2025
    Veröffentlicht in IEEE transactions on smart grid (01.07.2025)
    “… Cloud-based energy management systems (EMS) in smart grids face privacy challenges, as existing methods based on traditional homomorphic encryption support …”
    Volltext
    Journal Article
  10. 10

    Provably secure two-party authenticated key agreement protocol for post-quantum environments von Islam, SK Hafizul

    ISSN: 2214-2126
    Veröffentlicht: Elsevier Ltd 01.06.2020
    Veröffentlicht in Journal of information security and applications (01.06.2020)
    “… •We proposed a lattice-based two-party authenticated key agreement (LB-2PAKA) protocol for post-quantum environments.•The proposed LB-2PAKA protocol is …”
    Volltext
    Journal Article
  11. 11

    Ultra High-Speed Polynomial Multiplications for Lattice-Based Cryptography on FPGAs von Kundi, Dur-e-Shahwar, Zhang, Yuqing, Wang, Chenghua, Khalid, Ayesha, ONeill, Maire, Liu, Weiqiang

    ISSN: 2168-6750, 2168-6750
    Veröffentlicht: New York IEEE 01.10.2022
    Veröffentlicht in IEEE transactions on emerging topics in computing (01.10.2022)
    “… Lattice-based cryptography (LBC) has emerged as the most viable substitutes to the classical cryptographic schemes as 5 out of 7 finalist schemes in the 3rd …”
    Volltext
    Journal Article
  12. 12

    PB-3PAKA: Password-based three-party authenticated key agreement protocol for mobile devices in post-quantum environments von Islam, SK Hafizul, Basu, Swagatam

    ISSN: 2214-2126
    Veröffentlicht: Elsevier Ltd 01.12.2021
    Veröffentlicht in Journal of information security and applications (01.12.2021)
    “… Different mobile-based web applications have become popular among mobile users due to the enormous evolution of mobile communication technologies and hardware …”
    Volltext
    Journal Article
  13. 13

    Lightweight Post-Quantum Cryptography: Applications and Countermeasures in Internet of Things, Blockchain, and E-Learning von Chin-Ling Chen, Kuang-Wei Zeng, Wei-Ying Li, Chin-Feng Lee, Ling-Chun Liu, Yong-Yuan Deng

    ISSN: 2673-4591
    Veröffentlicht: MDPI AG 01.08.2025
    Veröffentlicht in Engineering proceedings (01.08.2025)
    “… With the rapid advancement of quantum computing technology, traditional encryption methods are encountering unprecedented challenges in the Internet of Things …”
    Volltext
    Journal Article
  14. 14

    PQES: Post-quantum encryption and signature scheme based on FFT-accelerated polynomial ring lattice for IoT devices von Zhang, Zexiang, Rao, Hong, Jia, Shaoqing, Feng, Huiling, Liu, Shuanggen

    ISSN: 1383-7621
    Veröffentlicht: Elsevier B.V 01.10.2025
    Veröffentlicht in Journal of systems architecture (01.10.2025)
    “… With the rapid advancement of quantum computing, traditional public-key cryptosystems (e.g., RSA and ECC) are facing severe threats from quantum attacks (e.g., …”
    Volltext
    Journal Article
  15. 15

    Anonymous quantum-safe secure and authorized communication protocol under dynamic identities for Internet of Drones von Chaudhary, Dharminder, Lee, Cheng-Chi

    ISSN: 0045-7906
    Veröffentlicht: Elsevier Ltd 01.12.2024
    Veröffentlicht in Computers & electrical engineering (01.12.2024)
    “… The Internet of Drones (IoD) refers to the integration of unmanned aerial vehicles (UAVs) into the broader Internet of Things (IoT) ecosystem. This connection …”
    Volltext
    Journal Article
  16. 16

    Compact and Flexible KEM From Ideal Lattice von Jin, Zhengzhong, Shen, Shiyu, Zhao, Yunlei

    ISSN: 0018-9448, 1557-9654
    Veröffentlicht: New York IEEE 01.06.2022
    Veröffentlicht in IEEE transactions on information theory (01.06.2022)
    “… A remarkable breakthrough in mathematics in recent years is the proof of the long-standing conjecture: sphere packing in the <inline-formula> <tex-math …”
    Volltext
    Journal Article
  17. 17

    An Efficient RLWE-Based Privacy-Preserving Authentication Scheme Based on Edge Computing in Industrial Internet of Things von Huang, Yongfei, Xu, Guangxia, Song, Xiaoling, Xu, Yuqing

    ISSN: 1939-1374, 2372-0204
    Veröffentlicht: IEEE 01.09.2024
    Veröffentlicht in IEEE transactions on services computing (01.09.2024)
    “… An industrial network connects devices, sensors, and other physical devices through wireless networks to collect, share, and analyze data to increase …”
    Volltext
    Journal Article
  18. 18

    Lattice-based key agreement protocol under ring-LWE problem for IoT-enabled smart devices von Rana, Saurabh, Mishra, Dheerendra

    ISSN: 0256-2499, 0973-7677
    Veröffentlicht: New Delhi Springer India 01.06.2021
    Veröffentlicht in Sadhana (Bangalore) (01.06.2021)
    “… Advances in communication technologies along with the availability of Internet and Internet of Things (IoT) devices enable users to acquire various services …”
    Volltext
    Journal Article
  19. 19

    Fast multiplication and the PLWE–RLWE equivalence for an infinite family of maximal real subfields of cyclotomic fields von Ahola, Joonas, Blanco-Chacón, Iván, Bolaños, Wilmar, Haavikko, Antti, Hollanti, Camilla, Sánchez-Ledesma, Rodrigo M.

    ISSN: 0925-1022, 1573-7586
    Veröffentlicht: Dordrecht Springer Nature B.V 01.08.2025
    Veröffentlicht in Designs, codes, and cryptography (01.08.2025)
    “… We prove the equivalence between the Ring Learning With Errors (RLWE) and the Polynomial Learning With Errors (PLWE) problems for the maximal totally real …”
    Volltext
    Journal Article
  20. 20

    Anonymous Quantum Safe Construction of Three Party Authentication and Key Agreement Protocol for Mobile Devices von Chaudhary, Dharminder, Kumar Dadsena, Pradeep, Padmavathi, A., Mehedi Hassan, Mohammad, Fahad Alkhamees, Bader, Kumar, Uddeshaya

    ISSN: 2169-3536, 2169-3536
    Veröffentlicht: Piscataway IEEE 2024
    Veröffentlicht in IEEE access (2024)
    “… Once the shared secret key is established, three parties can use it for secure communication using symmetric-key encryption AES (128, 192, 256) algorithms or …”
    Volltext
    Journal Article