Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems
DOI10.1007/978-3-642-33027-8_31zbMATH Open1294.94050OpenAlexW147447691WikidataQ57484391 ScholiaQ57484391MaRDI QIDQ4649797FDOQ4649797
Authors: Tim Güneysu, Vadim Lyubashevsky, Thomas Pöppelmann
Publication date: 13 November 2012
Published in: Cryptographic Hardware and Embedded Systems – CHES 2012 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-33027-8_31
Recommendations
- Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware
- A selection of recent lattice-based signature and encryption schemes
- Enhanced lattice-based signatures on reconfigurable hardware
- A lattice-based McEliece scheme for encryption and signature
- An efficient lattice-based signature scheme with provably secure instantiation
- Improvement and efficient implementation of a lattice-based signature scheme
- Efficient lattice-based signature scheme
- Asymptotically Efficient Lattice-Based Digital Signatures
- Asymptotically efficient lattice-based digital signatures
- Practical lattice-based cryptography: \texttt{NTRUEncrypt} and \texttt{NTRUSign}
FPGAPost-Quantum CryptographyIdeal LatticesLattice-Based CryptographySignature Scheme Implementation
Cited In (49)
- Lattice-based proof of shuffle and applications to electronic voting
- SoK: how (not) to design and implement post-quantum cryptography
- Augmented Learning with Errors: The Untapped Potential of the Error Term
- An efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using lattice
- Tightly secure signature schemes from the LWE and subset sum assumptions
- A scalable post-quantum hash-based group signature
- Round optimal secure multisignature schemes from lattice with public key aggregation and signature compression
- On removing rejection conditions in practical lattice-based signatures
- Quantum key search for ternary LWE
- Short, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofs
- Public key compression for constrained linear signature schemes
- SETLA: Signature and Encryption from Lattices
- Software speed records for lattice-based signatures
- How to meet ternary LWE keys
- A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack
- High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers
- How to find ternary LWE keys using locality sensitive hashing
- Secure Implementation of Lattice-Based Encryption Schemes
- Memory-efficient attacks on small LWE keys
- A novel certificateless multi-signature scheme over NTRU lattices
- Profiling side-channel attacks on Dilithium. A small bit-fiddling leak breaks it all
- Forward security of Fiat-Shamir lattice signatures
- Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices
- Improvement and efficient implementation of a lattice-based signature scheme
- Sampling from discrete Gaussians for lattice-based cryptography on a constrained device
- Analyzing the shuffling side-channel countermeasure for lattice-based signatures
- The shortest signatures ever
- Masking the GLP lattice-based signature scheme at any order
- LP solutions of vectorial integer subset sums -- cryptanalysis of Galbraith's binary matrix LWE
- A signcryption scheme based learning with errors over rings without trapdoor
- Computational quantum key distribution (CQKD) on decentralized ledger and blockchain
- A Ring-LWE-based digital signature inspired by Lindner-Peikert scheme
- An efficient blind signature scheme based on SM2 signature algorithm
- A lightweight identification protocol based on lattices
- Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures
- A practical post-quantum public-key cryptosystem based on spLWE
- Key recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU lattices
- A novel identity-based multi-signature scheme over NTRU lattices
- The lattice-based digital signature scheme qTESLA
- Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices
- The whole is less than the sum of its parts: constructing more efficient lattice-based AKEs
- Duplication free public keys based on SIS-type problems
- Digital Signatures Based on the Hardness of Ideal Lattice Problems in All Rings
- Fiat-Shamir signatures based on module-NTRU
- Title not available (Why is that?)
- A new R-LWE based digital signature scheme
- Memory-efficient attacks on small LWE keys
- An efficient lattice-based signature scheme with provably secure instantiation
- Sequential half-aggregation of lattice-based signatures
Uses Software
This page was built for publication: Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4649797)