Abstract. Present-day public-key cryptosystems such as RSA and Elliptic Curve Cryptography (ECC) will become insecure when quantum computers become a reality. This paper presents the new state of the art in efficient software imple-mentations of a post-quantum secure public-key encryption scheme based on the ring-LWE problem. We use a 32-bit ARM Cortex-M4F microcontroller as the tar-get platform. Our contribution includes optimization techniques for fast discrete Gaussian sampling and efficient polynomial multiplication. This implementation beats all known software implementations, on any architecture, by at least one or-der of magnitude. We further show that our scheme beats all ECC-based public-key encryption schemes by at least one order...
This thesis studies techniques for the efficient implementation of public-key cryptography on resour...
This thesis studies techniques for the efficient implementation of public-key cryptography on resour...
Recently, ARM NEON architecture has occupied a significant share of tablet and smartphone markets du...
The vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags ...
© International Association for Cryptologic Research 2015. Public-key cryptography based on the “rin...
The security of public-key cryptography depends on the computational intractability of some hard pro...
Abstract. Public-key cryptography based on the “ring-variant ” of the Learning with Errors (ring-LWE...
The vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags ...
Public-key cryptography based on the "ring-variant" of the Learning with Errors (ring-LWE) problem i...
Abstract. Presence of quantum computers is a real threat against the security of currently used publ...
peer reviewedPublic-key cryptography based on the "ring-variant" of the Learning with Errors (ring-L...
To the best of our knowledge, we present the first hardware implementation of isogeny-based cryptogr...
To the best of our knowledge, we present the first hardware implementation of isogeny-based cryptogr...
To the best of our knowledge, we present the first hardware implementation of isogeny-based cryptogr...
This thesis studies techniques for the efficient implementation of public-key cryptography on resour...
This thesis studies techniques for the efficient implementation of public-key cryptography on resour...
This thesis studies techniques for the efficient implementation of public-key cryptography on resour...
Recently, ARM NEON architecture has occupied a significant share of tablet and smartphone markets du...
The vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags ...
© International Association for Cryptologic Research 2015. Public-key cryptography based on the “rin...
The security of public-key cryptography depends on the computational intractability of some hard pro...
Abstract. Public-key cryptography based on the “ring-variant ” of the Learning with Errors (ring-LWE...
The vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags ...
Public-key cryptography based on the "ring-variant" of the Learning with Errors (ring-LWE) problem i...
Abstract. Presence of quantum computers is a real threat against the security of currently used publ...
peer reviewedPublic-key cryptography based on the "ring-variant" of the Learning with Errors (ring-L...
To the best of our knowledge, we present the first hardware implementation of isogeny-based cryptogr...
To the best of our knowledge, we present the first hardware implementation of isogeny-based cryptogr...
To the best of our knowledge, we present the first hardware implementation of isogeny-based cryptogr...
This thesis studies techniques for the efficient implementation of public-key cryptography on resour...
This thesis studies techniques for the efficient implementation of public-key cryptography on resour...
This thesis studies techniques for the efficient implementation of public-key cryptography on resour...
Recently, ARM NEON architecture has occupied a significant share of tablet and smartphone markets du...