International audienceNearly all of the currently used and well-tested signature schemes (e.g. RSA or DSA) are based either on the factoring assumption or the presumed intractability of the discrete logarithm problem. Further algorithmic advances on these problems may lead to the unpleasant situation that a large number of schemes have to be replaced with alternatives. In this work we present such an alternative - a signature scheme whose security is derived from the hardness of lattice problems. It is based on recent theoretical advances in lattice-based cryptography and is highly optimized for practicability and use in embedded systems. The public and secret keys are roughly 12000 and 2000 bits long, while the signature size is approximat...
In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece publi...
Creation of smart spaces and scaling of devices to achieve miniaturization in pervasive computing en...
With the rapid advancements in information technology, data security has become an indispensable com...
Abstract. Nearly all of the currently used and well-tested signature schemes (e.g. RSA or DSA) are b...
Abstract—Nearly all of the currently used signature schemes, such as RSA or DSA, are based either on...
Abstract. At CT-RSA 2014 Bai and Galbraith proposed a lattice-based signature scheme optimized for s...
Digital signatures are an important primitive for building secure systems and are used in most real ...
International audienceWe provide an alternative method for constructing lattice-based digital signat...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
Abstract. We provide an alternative method for constructing lattice-based digital signatures which d...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
Lattice-based cryptography is a prominent class of cryptographic systems that has been emerged as on...
International audienceOur main result is a construction of a lattice-based digital signature scheme ...
It is known that the development of quantum computers will break the cryptographic schemes that are...
Creation of smart spaces and scaling of devices to achieve miniaturization in pervasive computing en...
In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece publi...
Creation of smart spaces and scaling of devices to achieve miniaturization in pervasive computing en...
With the rapid advancements in information technology, data security has become an indispensable com...
Abstract. Nearly all of the currently used and well-tested signature schemes (e.g. RSA or DSA) are b...
Abstract—Nearly all of the currently used signature schemes, such as RSA or DSA, are based either on...
Abstract. At CT-RSA 2014 Bai and Galbraith proposed a lattice-based signature scheme optimized for s...
Digital signatures are an important primitive for building secure systems and are used in most real ...
International audienceWe provide an alternative method for constructing lattice-based digital signat...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
Abstract. We provide an alternative method for constructing lattice-based digital signatures which d...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
Lattice-based cryptography is a prominent class of cryptographic systems that has been emerged as on...
International audienceOur main result is a construction of a lattice-based digital signature scheme ...
It is known that the development of quantum computers will break the cryptographic schemes that are...
Creation of smart spaces and scaling of devices to achieve miniaturization in pervasive computing en...
In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece publi...
Creation of smart spaces and scaling of devices to achieve miniaturization in pervasive computing en...
With the rapid advancements in information technology, data security has become an indispensable com...