Ring learning with errors key exchange
Semantic Scholar uses AI to extract papers important to this topic.
In this work, we provide a complexity analysis of the trade-off between performance and security for two post-quantum key… Expand Authenticated encryption (AE) is very suitable for a resources constrained environment for it needs less computational costs and… Expand In data security, the main objectives one tries to achieve are confidentiality, data integrity and authentication. In a public… Expand In data security, the main objectives one tries to achieve are privacy, data integrity and authentication. In a public-key… Expand Password-based Authenticated Key Exchange (PAKE) protocol assumes that the parties share a low-entropy, easy-to-remember password… Expand Two post-quantum password-based authenticated key exchange (PAKE) protocols were proposed at CTRSA 2017. Following this work, we… Expand LWE/RLWE-based cryptosystems require sampling error term from discrete Gaussian distribution. However, some existing samplers are… Expand In this report we review four post-quantum cryptosystems: the ring learning with errors key exchange, the supersingular isogeny… Expand