In 2014, Peikert described the first practical lattice-based key exchange that is provably secure and provides perfect forward security. However, his presentation lacks concrete pro-posals for parameters. We aim to provide a clear description of how the algorithm can be implemented along with some analysis for potential parameters. Previously in 2015, Singh considered the simpler case, as chosen by Bos, Costello, Naehrig and Stebila in 2014, of cyclotomic rings with power-of-two degree. In this work we focus on the case of cyclotomic rings with degree p − 1 for prime p. This allows for a greater degree of flexibility in choosing lattice dimension, which determines the security level and efficiency of the scheme. We describe the necessary ar...
SummaryWang et al. proposed a new hard problem on lattices which is an extension of the small intege...
DARPA or the U.S. Government, or the Sloan Foundation. The U.S. Government is authorized to reproduc...
In this article, we propose a new lattice-based threshold ring signature scheme, modifying Aguilar'...
In 2014, Peikert described the first practical lattice-based key exchange that is provably secure an...
In [21], Peikert presents an efficient and provably secure set of lower level primitives for practic...
In recent years, lattice-based cryptography has been recognized for its many attractive properties, ...
International audienceRecent advances in lattice cryptography, mainly stemming from the development ...
Public-key cryptography is an indispensable component used in almost all of our present-day digital ...
The thesis is focused on the theory of special lattices that are important in cryptography, namely i...
We construct a key exchange scheme with session key security and Alice's privacy, assuming the ...
Lattice-based cryptography is one of the candidates in the area of post-quantum cryptography. Crypto...
Lattice-based cryptography is a branch of cryptography exploiting the presumed hardness of some well...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
Lattice-based cryptography began with the seminal work of Ajtai (Ajtai '96) who showed that it is po...
Abstract. There is a lack of more complicated ideal-lattice-based cryp-tosystems which require the u...
SummaryWang et al. proposed a new hard problem on lattices which is an extension of the small intege...
DARPA or the U.S. Government, or the Sloan Foundation. The U.S. Government is authorized to reproduc...
In this article, we propose a new lattice-based threshold ring signature scheme, modifying Aguilar'...
In 2014, Peikert described the first practical lattice-based key exchange that is provably secure an...
In [21], Peikert presents an efficient and provably secure set of lower level primitives for practic...
In recent years, lattice-based cryptography has been recognized for its many attractive properties, ...
International audienceRecent advances in lattice cryptography, mainly stemming from the development ...
Public-key cryptography is an indispensable component used in almost all of our present-day digital ...
The thesis is focused on the theory of special lattices that are important in cryptography, namely i...
We construct a key exchange scheme with session key security and Alice's privacy, assuming the ...
Lattice-based cryptography is one of the candidates in the area of post-quantum cryptography. Crypto...
Lattice-based cryptography is a branch of cryptography exploiting the presumed hardness of some well...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
Lattice-based cryptography began with the seminal work of Ajtai (Ajtai '96) who showed that it is po...
Abstract. There is a lack of more complicated ideal-lattice-based cryp-tosystems which require the u...
SummaryWang et al. proposed a new hard problem on lattices which is an extension of the small intege...
DARPA or the U.S. Government, or the Sloan Foundation. The U.S. Government is authorized to reproduc...
In this article, we propose a new lattice-based threshold ring signature scheme, modifying Aguilar'...