Post-Quantum Lattice-Based Cryptography Implementations

@article{Nejatollahi2019PostQuantumLC,
  title={Post-Quantum Lattice-Based Cryptography Implementations},
  author={Hamid Nejatollahi and N. Dutt and S. Ray and F. Regazzoni and Indranil Banerjee and Rosario Cammarota},
  journal={ACM Computing Surveys (CSUR)},
  year={2019},
  volume={51},
  pages={1 - 41}
}
The advent of quantum computing threatens to break many classical cryptographic schemes, leading to innovations in public key cryptography that focus on post-quantum cryptography primitives and protocols resistant to quantum computing threats. Lattice-based cryptography is a promising post-quantum cryptography family, both in terms of foundational properties as well as in its application to both traditional and emerging security problems such as encryption, digital signature, key exchange, and… Expand
31 Citations
Incorporating post-quantum cryptography in a microservice environment
  • PDF
Exploring Energy Efficient Quantum-resistant Signal Processing Using Array Processors
  • 3
  • PDF
Post-Quantum Authentication in TLS 1.3: A Performance Study
  • 17
  • PDF
VPQC: A Domain-Specific Vector Processor for Post-Quantum Cryptography Based on RISC-V Architecture
  • Guozhu Xin, J. Han, +4 authors X. Zeng
  • Computer Science
  • IEEE Transactions on Circuits and Systems I: Regular Papers
  • 2020
  • 7
Synthesis of Flexible Accelerators for Early Adoption of Ring-LWE Post-quantum Cryptography
  • 5
Lattice-Based Cryptoprocessor for CCA-Secure Identity-Based Encryption
  • 1
...
1
2
3
4
...

References

SHOWING 1-10 OF 62 REFERENCES
Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project
  • 49
  • Highly Influential
  • PDF
CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM
  • 237
  • Highly Influential
  • PDF
Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem
  • 287
  • Highly Influential
  • PDF
Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware
  • 133
  • Highly Influential
  • PDF
Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware
  • 118
  • Highly Influential
  • PDF
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE
  • 242
  • Highly Influential
  • PDF
Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems
  • 244
  • Highly Influential
  • PDF
Efficient implementation of ideal lattice-based cryptography
  • 9
  • Highly Influential
  • PDF
Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-Quantum Cryptography
  • 20
  • Highly Influential
Speeding up R-LWE Post-quantum Key Exchange
  • 24
  • Highly Influential
  • PDF
...
1
2
3
4
5
...