搜索结果: 1-15 共查到“lattice”相关记录692条 . 查询时间(0.148 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Solving hidden number problem with lattice sieving
晶格筛分 隐数问题 格约简算法
2023/4/28
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Peak distributions and peak maps in lattice paths
晶格路径 峰分布 峰图
2023/4/13
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Random Surface, Planar Lattice Model, and Conformal Field Theory
随机曲面 平面晶格模型 共形场论
2023/4/13
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Rational solutions of KP and BKP hierarchies through Toda lattice
户田晶格 KP BKP 层次结构 合理解
2023/4/27
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Algebro-geometric solutions to the Bogoyavlensky lattice 2(3) equations
博戈亚夫连斯基格2(3)方程 代数几何解 四边形曲线理论
2023/5/5
Quantum Algorithms for the Approximate k-List Problem and their Application to Lattice Sieving
approximate k-list problem cryptanalysis distributed computation
2019/9/16
The Shortest Vector Problem (SVP) is one of the mathematical foundations of lattice based cryptography. Lattice sieve algorithms are amongst the foremost methods of solving SVP. The asymptotically fas...
An efficient and secure ID-based multi-proxy multi-signature scheme based on lattice
multi-proxy multi-signature scheme multi-signature scheme ID-based signature
2019/9/16
Multi-proxy multi-signature schemes are useful in distributed networks, where a group of users cooperatively could delegate their administrative rights to the users of another group, who are authorize...
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes
Lattice based cryptography side-channel attacks CCA transformation
2019/8/21
In this article, we demonstrate practical side-channel assisted chosen-ciphertext attacks (CCA) over multiple CCA-secure lattice-based public-key encryption schemes (PKE) and key-encapsulation mechani...
Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto
Masking Post-quantum Cryptography
2019/8/8
With the rising popularity of lattice-based cryptography, the Learning with Errors (LWE) problem has emerged as a fundamental core of numerous encryption and key exchange schemes. Many LWE-based schem...
WIDESEAS: A lattice-based PIR scheme implemented in EncryptedQuery
Private Information Retrieval PIR homomorphic encryption
2019/7/24
We introduce the WIDESEAS protocol for lattice-based Private Information Retrieval (PIR), and we give performance numbers for its recent implementation in the EncryptedQuery open-source PIR software. ...
Exploiting Determinism in Lattice-based Signatures - Practical Fault Attacks on pqm4 Implementations of NIST candidates
Deterministic Lattice Signatures pqm4 Fault Attack
2019/7/8
In this paper, we analyze the implementation level fault vulnerabilities of deterministic lattice-based signature schemes. In particular, we extend the practicality of skip-addition fault attacks thro...
Lattice-Based Remote User Authentication from Reusable Fuzzy Signature
Lattice-Based Cryptography Fuzzy Signatures Biometrics Reusability
2019/6/26
In this paper, we introduce a new construction of lattice-based reusable fuzzy signature for remote user authentication that is secure against quantum computers. We define formal security models for t...
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications
Lattice Zero-Knowledge Argument
2019/6/26
We provide new zero-knowledge argument of knowledge systems that work directly for a wide class of language, namely, ones involving the satisfiability of matrix-vector relations and integer relations ...
On Security of Fiat-Shamir Signatures over Lattice in the Presence of Randomness Leakage
Randomness leakage attacks Fiat-Shamir signature Dilithium
2019/6/19
Leakage during the signing process, including partial key exposure and partial (or complete) randomness leakage, may be devastating for the security of digital signatures. In this work, we consider th...