Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems - MaRDI portal

Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems

From MaRDI portal
Publication:4649797

DOI10.1007/978-3-642-33027-8_31zbMath1294.94050OpenAlexW147447691WikidataQ57484391 ScholiaQ57484391MaRDI QIDQ4649797

Thomas Pöppelmann, Tim Güneysu, Vadim Lyubashevsky

Publication date: 13 November 2012

Published in: Cryptographic Hardware and Embedded Systems – CHES 2012 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-33027-8_31




Related Items

Computational quantum key distribution (CQKD) on decentralized ledger and blockchainLattice-based proof of shuffle and applications to electronic votingSoK: how (not) to design and implement post-quantum cryptographyHow to meet ternary LWE keysA scalable post-quantum hash-based group signatureRound Optimal Secure Multisignature Schemes from Lattice with Public Key Aggregation and Signature CompressionThe Shortest Signatures EverAnalyzing the Shuffling Side-Channel Countermeasure for Lattice-Based SignaturesHow to find ternary LWE keys using locality sensitive hashingShort, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofsA Ring-LWE-based digital signature inspired by Lindner-Peikert schemeDuplication free public keys based on SIS-type problemsHigh-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega MicrocontrollersA Novel Certificateless Multi-signature Scheme over NTRU LatticesA detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attackAugmented Learning with Errors: The Untapped Potential of the Error TermA novel identity-based multi-signature scheme over NTRU latticesDigital Signatures Based on the Hardness of Ideal Lattice Problems in All RingsA lightweight identification protocol based on latticesSETLA: Signature and Encryption from LatticesFiat-Shamir signatures based on module-NTRUSecure Implementation of Lattice-Based Encryption SchemesLoop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signaturesAn efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using latticeA Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$Public key compression for constrained linear signature schemesThe lattice-based digital signature scheme qTESLAA Signcryption Scheme Based Learning with Errors over Rings Without TrapdoorLP Solutions of Vectorial Integer Subset Sums – Cryptanalysis of Galbraith’s Binary Matrix LWEMasking the GLP lattice-based signature scheme at any orderTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesSampling from discrete Gaussians for lattice-based cryptography on a constrained deviceKey recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU latticesAn efficient blind signature scheme based on SM2 signature algorithmThe Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEsTightly secure signature schemes from the LWE and subset sum assumptionsQuantum key search for ternary LWEOn removing rejection conditions in practical lattice-based signatures


Uses Software



This page was built for publication: Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems