Search

Your search keyword '"ring-LWE"' showing total 83 results

Search Constraints

Start Over You searched for: Descriptor "ring-LWE" Remove constraint Descriptor: "ring-LWE"
83 results on '"ring-LWE"'

Search Results

51. Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware

52. A New Ring-Based SPHF and PAKE Protocol on Ideal Lattices.

53. HEPCloud: An FPGA-Based Multicore Processor for FV Somewhat Homomorphic Function Evaluation.

54. IoT application protection against power analysis attack.

55. A Resource-Efficient and Side-Channel Secure Hardware Implementation of Ring-LWE Cryptographic Processor.

56. Practical CCA2-Secure and Masked Ring-LWE Implementation

57. A novel combined correlation power analysis (CPA) attack on schoolbook polynomial multiplication in lattice-based cryptosystems

58. Towards a Ring Analogue of the Leftover Hash Lemma

59. Homomorphic AES evaluation using the modified LTV scheme.

60. Masking ring-LWE.

61. FPGA-Based Hardware Accelerator for Leveled Ring-LWE Fully Homomorphic Encryption

62. High Efficiency Ring-LWE Cryptoprocessor Using Shared Arithmetic Components

63. Field switching in BGV-style homomorphic encryption.

64. CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes

65. Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols

66. High-Speed Polynomial Multiplication Architecture for Ring-LWE and SHE Cryptosystems.

68. High Efficiency Ring-LWE Cryptoprocessor Using Shared Arithmetic Components.

69. NTRU prime: reducing attack surface at low cost

70. Post-quantum key exchange - a new hope

71. Post-Quantum Key Exchange -- A new hope

72. An efficient full dynamic group signature scheme over ring.

73. FHEW: Bootstrapping Homomorphic Encryption in less than a second

74. Post-Quantum Key Exchange -- A new hope

75. FHEW: Bootstrapping Homomorphic Encryption in less than a second

76. Post-kvantová kryptografie na omezených zařízeních

77. Post-kvantová kryptografie na omezených zařízeních

78. Post-kvantová kryptografie na omezených zařízeních

79. Post-kvantová kryptografie na omezených zařízeních

80. Post-kvantová kryptografie na omezených zařízeních

81. Post-kvantová kryptografie na omezených zařízeních

82. Tree-Based Ring-LWE Group Key Exchanges with Logarithmic Complexity

83. Tree-Based Ring-LWE Group Key Exchanges with Logarithmic Complexity

Catalog

Books, media, physical & digital resources