Ring learning with errors key exchange

Known as: RLWE-KEX, Ring-LWE key exchange, Rlwe kex 
In cryptography, a public key exchange algorithm is a cryptographic algorithm which allows two parties to create and share a secret key, which they… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1999-2016
02419992016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Secure Simple Pairing protocol of Bluetooth introduced in Bluetooth version 2.1 + EDR has security issues. Shared secret key… (More)
Is this relevant?
2016
2016
Post-quantum cryptography has attracted increased attention in the last couple of years, due to the threat of quantum computers… (More)
  • figure 1
  • table 1
  • figure 2
Is this relevant?
2016
2016
We propose a Decentralized multi-authority Ciphertext-Policy Attribute-Based Encryption (DCP-ABE) scheme, where any party can… (More)
  • table I
Is this relevant?
2016
2016
The Number Theoretic Transform (NTT) provides efficient algorithms for cyclic and nega-cyclic convolutions, which have many… (More)
  • figure 1
  • table 1
Is this relevant?
2015
2015
Lattice-based cryptographic primitives are believed to offer resilience against attacks by quantum computers. We demonstrate the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Review
2015
Review
2015
In this report we review four post-quantum cryptosystems: the ring learning with errors key exchange, the supersingular isogeny… (More)
  • table 1
Is this relevant?
2015
2015
Compared to the classical cryptography, lattice-based cryptography is more secure, flexible and simple, and it is believed to be… (More)
  • table 1
  • table 2
  • figure 1-4
  • table 3
  • figure 1
Is this relevant?
2015
2015
In this paper we present a new NTRU-Like public key cryptosystem with security provably based on the worst case hardness of the… (More)
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Lattice-based cryptographic primitives are believed to offer resilience against attacks by quantum computers. We demonstrate the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
1999
1999
The folding/unfolding equilibrium of the R-spectrin SH3 domain has been measured by NMRdetected hydrogen/deuterium exchange and… (More)
  • figure 1
  • figure 3
  • figure 2
  • table 1
  • figure 5
Is this relevant?