A Family of Scalable Polynomial Multiplier Architectures for Ring-LWE Based Cryptosystems
暂无分享,去创建一个
[1] Vadim Lyubashevsky,et al. Lattice Signatures Without Trapdoors , 2012, IACR Cryptol. ePrint Arch..
[2] Frederik Vercauteren,et al. High-Speed Polynomial Multiplication Architecture for Ring-LWE and SHE Cryptosystems , 2015, IEEE Transactions on Circuits and Systems I: Regular Papers.
[3] Frederik Vercauteren,et al. Compact Ring-LWE Cryptoprocessor , 2014, CHES.
[4] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[5] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[6] J. Pollard,et al. The fast Fourier transform in a finite field , 1971 .
[7] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2009, JACM.
[8] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[9] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[10] Franz Winkler,et al. Polynomial Algorithms in Computer Algebra , 1996, Texts and Monographs in Symbolic Computation.
[11] Damien Stehlé,et al. Classical hardness of learning with errors , 2013, STOC '13.
[12] Michael Schneider,et al. Estimating the Security of Lattice-based Cryptosystems , 2010, IACR Cryptol. ePrint Arch..
[13] Ronald L. Rivest,et al. Introduction to Algorithms, 3rd Edition , 2009 .
[14] Chaohui Du,et al. A Family of Scalable Polynomial Multiplier Architectures for Lattice-Based Cryptography , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[15] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[16] J. Tukey,et al. An algorithm for the machine calculation of complex Fourier series , 1965 .
[17] Tim Güneysu,et al. Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware , 2012, LATINCRYPT.
[18] Chris Peikert,et al. Better Key Sizes (and Attacks) for LWE-Based Encryption , 2011, CT-RSA.
[19] Daniel J. Bernstein,et al. Introduction to post-quantum cryptography , 2009 .
[20] Sorin A. Huss,et al. On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes , 2012, CHES.
[21] Miklós Ajtai,et al. Generating hard instances of lattice problems (extended abstract) , 1996, STOC '96.
[22] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[23] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[24] RegevOded,et al. On Ideal Lattices and Learning with Errors over Rings , 2013 .
[25] Patrick Schaumont,et al. Low-cost and area-efficient FPGA implementations of lattice-based cryptography , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).