搜索结果: 1-6 共查到“军队指挥学 lattice-based encryption”相关记录6条 . 查询时间(0.062 秒)
Comparing proofs of security for lattice-based encryption
lattice-based cryptography security proofs
2019/6/13
This paper describes the limits of various "security proofs", using 36 lattice-based KEMs as case studies. This description allows the limits to be systematically compared across these KEMs; shows tha...
Visualizing size-security tradeoffs for lattice-based encryption
lattice-based cryptography security estimates network traffic
2019/6/5
There are many proposed lattice-based encryption systems. How do these systems compare in the security that they provide against known attacks, under various limits on communication volume? There are ...
Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform
Post-Quantum Cryptography Lattice-based Encryption Scheme Java Card
2019/1/2
Memory-constrained devices, including widely used smart cards, require resisting attacks by the quantum computers. Lattice-based encryption scheme possesses high efficiency and reliability which could...
"HILA5 Pindakaas": On the CCA security of lattice-based encryption with error correction
Post-quantum cryptography KEM RLWE
2017/12/19
We show that HILA5 is not secure against chosen-ciphertext attacks. Specifically, we demonstrate a key-recovery attack on HILA5 using an active attack on reused keys. The attack works around the error...
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
Lattice-Based Cryptography Side-Channel Analysis Single-Trace Attack
2017/6/22
Although lattice-based cryptography has proven to be a particularly efficient approach to post-quantum cryptography, its security against side-channel attacks is still a very open topic. There already...
Lattice-based encryption schemes still suffer from a low message throughput per ciphertext and inefficient solutions towards realizing enhanced security characteristics such as CCA1- or CCA2-security....