Search

Your search keyword '"NewHope"' showing total 47 results

Search Constraints

Start Over You searched for: Descriptor "NewHope" Remove constraint Descriptor: "NewHope"
47 results on '"NewHope"'

Search Results

2. Study of the Reconciliation Mechanism of NewHope

3. modification proposal for the reconciliation mechanism of the key exchange algorithm NewHope.

5. Security of Two NIST Candidates in the Presence of Randomness Reuse

6. Improving Key Mismatch Attack on NewHope with Fewer Queries

7. Defeating NewHope with a Single Trace

8. Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAs

9. Preprocess-then-NTT Technique and Its Applications to Kyber and NewHope

10. INAKA: Improved Authenticated Key Agreement Protocol Based on Newhope

11. Efficient NewHope Cryptography Based Facial Security System on a GPU

12. High-Speed Masking for Polynomial Comparison in Lattice-based KEMs

13. ISA Extensions for Finite Field Arithmetic

14. Highly Efficient Architecture of NewHope-NIST on FPGA using Low-Complexity NTT/INTT

15. An Efficient Implementation of the NewHope Key Exchange on FPGAs.

16. Efficient Parallel Implementations of LWE-Based Post-Quantum Cryptosystems on Graphics Processing Units

17. A modification proposal for the reconciliation mechanism of the key exchange algorithm NewHope

18. Highly Efficient Architecture of NewHope-NIST on FPGA using Low-Complexity NTT/INTT

19. INAKA: Improved Authenticated Key Agreement Protocol Based on Newhope

20. Efficient NewHope Cryptography Based Facial Security System on a GPU

21. A modification proposal for the reconciliation mechanism of the key exchange algorithm NewHope

22. An Investigation of Methods to Improve Area and Performance of Hardware Implementations of a Lattice Based Cryptosystem

23. Cortex-m4 optimizations for {r,m}lwe schemes

24. ISA Extensions for Finite Field Arithmetic

25. ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V

26. Key exchange system - NewHope

27. Cortex-M4 Optimizations for {R, M}LWE Schemes

28. Securing Narrowband Wireless Communication In Licensed Band

29. Securing Narrowband Wireless Communication In Licensed Band

30. Securing Narrowband Wireless Communication In Licensed Band

31. Securing Narrowband Wireless Communication In Licensed Band

32. Performance and Comparison of post-quantum Cryptographic Algorithms

34. Prestanda och jämförelse av kvantresistenta kryptoalgoritmer

35. Efficient Parallel Implementations of LWE-Based Post-Quantum Cryptosystems on Graphics Processing Units.

36. Zabezpečení úzkopásmové licenční bezdrátové komunikace

37. Post-kvantová kryptografie na omezených zařízeních

38. Zabezpečení úzkopásmové licenční bezdrátové komunikace

39. Post-kvantová kryptografie na omezených zařízeních

40. ZabezpeÄen­ zkopsmov© licenÄn­ bezdrtov© komunikace

41. Post-kvantová kryptografie na omezených zařízeních

42. Zabezpečení úzkopásmové licenční bezdrátové komunikace

43. Post-kvantová kryptografie na omezených zařízeních

44. Zabezpečení úzkopásmové licenční bezdrátové komunikace

45. Post-kvantová kryptografie na omezených zařízeních

46. Zabezpečení úzkopásmové licenční bezdrátové komunikace

47. Post-kvantová kryptografie na omezených zařízeních

Catalog

Books, media, physical & digital resources