Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,268,536 papers from all fields of science
Search
Sign In
Create Free Account
Ring learning with errors signature
Known as:
RLWE-SIG
, Ring-LWE signature
Digital signatures are a means to protect digital information from intentional modification and to authenticate the source of digital information…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
BLISS signature scheme
Coefficient
Cryptographic hash function
Digital data
Expand
Broader (1)
Post-quantum cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Flattening NTRU for Evaluation Key Free Homomorphic Encryption
Yarkin Doröz
,
B. Sunar
IACR Cryptology ePrint Archive
2020
Corpus ID: 10842151
Abstract We propose a new FHE scheme F-NTRU that adopts the flattening technique proposed in GSW to derive an NTRU based scheme…
Expand
Highly Cited
2019
Highly Cited
2019
Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions
Rajat Chaudhary
,
G. Aujla
,
Neeraj Kumar
,
S. Zeadally
IEEE Internet of Things Journal
2019
Corpus ID: 58462644
Due to its widespread popularity and usage in many applications (smart transport, energy management, ${e}$ -healthcare, smart…
Expand
2018
2018
Lightweight Hardware Implementation of R-LWE Lattice-Based Cryptography
Sailong Fan
,
Weiqiang Liu
,
James Howe
,
A. Khalid
,
Máire O’Neill
Asia Pacific Conference on Circuits and Systems
2018
Corpus ID: 57763678
Lattice based cryptography (LBC) is one of the most promising post-quantum cryptographic candidates. Ring-learning with errors (R…
Expand
2017
2017
Decentralized Ciphertext-Policy Attribute-Based Encryption: A Post-Quantum Construction
Mohammad Shahriar Rahman
,
A. Basu
,
S. Kiyomoto
Journal of Internet Services and Information…
2017
Corpus ID: 38476777
In Ciphertext Policy Attribute-Based Encryption (CP-ABE) system, a set of attributes is associated with the private keys of each…
Expand
2017
2017
Design and analysis of pairing protocol for bluetooth enabled devices using R-LWE Lattice-based cryptography
S. Gajbhiye
,
S. Karmakar
,
Monisha Sharma
,
Sanjay Sharma
Journal of Information Security and Applications
2017
Corpus ID: 37981063
2016
2016
Arithmetic Coding and Blinding Countermeasures for Ring-LWE
Markku-Juhani O. Saarinen
IACR Cryptology ePrint Archive
2016
Corpus ID: 14222102
. In this work we apply information theoretically optimal arithmetic coding and a number of novel side-channel blinding…
Expand
2016
2016
Speeding up R-LWE Post-quantum Key Exchange
S. Gueron
,
Fabian Schlieker
Nordic Conference on Secure IT Systems
2016
Corpus ID: 10855019
Post-quantum cryptography has attracted increased attention in the last couple of years, due to the threat of quantum computers…
Expand
2015
2015
A Practical Key Exchange for the Internet using Lattice Cryptography
Vikram Singh
IACR Cryptology ePrint Archive
2015
Corpus ID: 15200612
In [21], Peikert presents an efficient and provably secure set of lower level primitives for practical post-quantum cryptography…
Expand
2015
2015
ILTRU: An NTRU-Like Public Key Cryptosystem Over Ideal Lattices
A. Karbasi
,
Reza Ebrahimi Atani
IACR Cryptology ePrint Archive
2015
Corpus ID: 1251567
In this paper we present a new NTRU-Like public key cryptosystem with security provably based on the worst case hardness of the…
Expand
2012
2012
A lattice-based digital signature from the Ring-LWE
Yan Wu
,
Zheng Huang
,
Jie Zhang
,
Q. Wen
IEEE International Conference on Network…
2012
Corpus ID: 18790263
We propose a variant version of ring learning with errors (R-LWE) assumption. Under the modified slightly assumption which is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required