Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,258,697 papers from all fields of science
Search
Sign In
Create Free Account
Lattice-based cryptography
Known as:
Lattice
, Lattice based cryptography
Lattice-based cryptography is the generic term for asymmetric cryptographic primitives based on lattices. While lattice-based cryptography has been…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Basis (linear algebra)
Computational hardness assumption
Cryptographic primitive
GGH signature scheme
Expand
Broader (2)
Cryptography
Post-quantum cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2020
Highly Cited
2020
Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography
J. M. B. Mera
,
A. Karmakar
,
I. Verbauwhede
IACR Cryptology ePrint Archive
2020
Corpus ID: 212423365
Since the introduction of the ring-learning with errors problem, the number theoretic transform (NTT) based polynomial…
Expand
Review
2019
Review
2019
Efficient and Flexible Low-Power NTT for Lattice-Based Cryptography
Tim Fritzmann
,
Martha Johanna Sepúlveda
IEEE International Symposium on Hardware Oriented…
2019
Corpus ID: 195224141
Secure communication is being threatened by the foreseeable breakthrough of quantum computers. When a larger quantum computer is…
Expand
Highly Cited
2018
Highly Cited
2018
On Practical Discrete Gaussian Samplers for Lattice-Based Cryptography
James Howe
,
A. Khalid
,
C. Rafferty
,
F. Regazzoni
,
Máire O’Neill
IEEE transactions on computers
2018
Corpus ID: 3322794
Lattice-based cryptography is one of the most promising branches of quantum resilient cryptography, offering versatility and…
Expand
Review
2018
Review
2018
Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography
Zhe Liu
,
Kim-Kwang Raymond Choo
,
J. Großschädl
IEEE Communications Magazine
2018
Corpus ID: 3266228
In order to increase the security of edge computing, all data transmitted to and from edge devices, as well as all data stored on…
Expand
Highly Cited
2015
Highly Cited
2015
Authenticated Key Exchange from Ideal Lattices
Jiang Zhang
,
Zhenfeng Zhang
,
Jintai Ding
,
Michael Snook
,
Özgür Dagdelen
International Conference on the Theory and…
2015
Corpus ID: 12959075
In this paper, we present a practical and provably secure two-pass authenticated key exchange protocol over ideal lattices, which…
Expand
2015
2015
Gaussian Sampling in Lattice-Based Cryptography
Thomas Prest
2015
Corpus ID: 1402114
Although rather recent, lattice-based cryptography has stood out on numerous points, be it by the variety of constructions that…
Expand
Highly Cited
2012
Highly Cited
2012
Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems
Tim Güneysu
,
Vadim Lyubashevsky
,
T. Pöppelmann
Workshop on Cryptographic Hardware and Embedded…
2012
Corpus ID: 115443
Nearly all of the currently used and well-tested signature schemes (e.g. RSA or DSA) are based either on the factoring assumption…
Expand
Highly Cited
2012
Highly Cited
2012
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes
Norman Göttert
,
Thomas Feller
,
Michael Schneider
,
J. Buchmann
,
S. Huss
Workshop on Cryptographic Hardware and Embedded…
2012
Corpus ID: 14262874
We present both a hardware and a software implementation variant of the learning with errors (LWE) based cryptosystem presented…
Expand
Review
2009
Review
2009
Some Recent Progress in Lattice-Based Cryptography
Theory of Cryptography Conference
2009
Corpus ID: 45610827
The past decade in computer science has witnessed tremendous progress in the understanding of lattices , which are a rich source…
Expand
Highly Cited
2006
Highly Cited
2006
Lattice-Based Cryptography
O. Regev
Annual International Cryptology Conference
2006
Corpus ID: 7280004
We describe some of the recent progress on lattice-based cryptography, starting from the seminal work of Ajtai, and ending with…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE