A masked ring-LWE implementation
From MaRDI portal
Recommendations
- Additively homomorphic ring-LWE masking
- Single-trace side-channel attacks on masked lattice-based encryption
- Masking large keys in hardware: a masked implementation of McEliece
- Efficient ring-LWE encryption on 8-bit AVR processors
- Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware
Cited in
(19)- Efficiently masking polynomial inversion at arbitrary order
- Fault-enabled chosen-ciphertext attacks on Kyber
- Assessing the feasibility of single trace power analysis of Frodo
- Secure Implementation of Lattice-Based Encryption Schemes
- Higher-order masked Saber
- Efficient ring-LWE encryption on 8-bit AVR processors
- A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not
- Masking large keys in hardware: a masked implementation of McEliece
- Detecting flawed masking schemes with leakage detection tests
- Masking the GLP lattice-based signature scheme at any order
- Compact ring-LWE cryptoprocessor
- One-hot conversion: towards faster table-based A2B conversion
- Tightly secure ring-LWE based key encapsulation with short ciphertexts
- Additively homomorphic ring-LWE masking
- Masking Dilithium. Efficient implementation and side-channel evaluation
- Single-trace side-channel attacks on masked lattice-based encryption
- Secure number theoretic transform and speed record for Ring-LWE encryption on embedded processors
- Masking the GLP lattice-based signature scheme at any order
- Adding distributed decryption and key generation to a ring-LWE based CCA encryption scheme
This page was built for publication: A masked ring-LWE implementation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1695914)