咨询与建议

限定检索结果

文献类型

  • 6 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 8 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 8 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 5 篇 信息与通信工程
    • 1 篇 软件工程

主题

  • 8 篇 ring-learning wi...
  • 4 篇 lattice-based cr...
  • 2 篇 homomorphic encr...
  • 2 篇 number theoretic...
  • 2 篇 encryption
  • 1 篇 runtime
  • 1 篇 bandwidth effici...
  • 1 篇 support vector m...
  • 1 篇 outsourcing
  • 1 篇 key encapsulatio...
  • 1 篇 elliptic curve d...
  • 1 篇 secure simple pa...
  • 1 篇 relaxation
  • 1 篇 discrete cosine ...
  • 1 篇 iron
  • 1 篇 error dependency
  • 1 篇 privacy-preservi...
  • 1 篇 optimization
  • 1 篇 residue number s...
  • 1 篇 fine-grained acc...

机构

  • 1 篇 gachon univ dept...
  • 1 篇 hongik univ dept...
  • 1 篇 csvtu sstc ssgi ...
  • 1 篇 univ waterloo de...
  • 1 篇 sorbonne univ li...
  • 1 篇 hanyang univ dep...
  • 1 篇 csvtu bit dept m...
  • 1 篇 indian inst info...
  • 1 篇 southeast univ s...
  • 1 篇 katholieke univ ...
  • 1 篇 minist publ secu...
  • 1 篇 csvtu bit comp a...
  • 1 篇 waseda univ toky...
  • 1 篇 waseda univ fac ...
  • 1 篇 chosun univ dept...
  • 1 篇 univ lisbon inst...
  • 1 篇 nit warangal dep...
  • 1 篇 seoul natl univ ...
  • 1 篇 csvtu ssgi sstc ...

作者

  • 1 篇 pei bei
  • 1 篇 lee eunsang
  • 1 篇 yamana hayato
  • 1 篇 martins paulo
  • 1 篇 venkatesan s.
  • 1 篇 ishimaki yu
  • 1 篇 karmakar angshum...
  • 1 篇 zucca vincent
  • 1 篇 verma shekhar
  • 1 篇 sharma monisha
  • 1 篇 lee wai-kong
  • 1 篇 han kyung hyun
  • 1 篇 hasan anwar
  • 1 篇 sharma sanjay
  • 1 篇 kim young-sik
  • 1 篇 lee seunghwan
  • 1 篇 eynard julien
  • 1 篇 zhou xianbin
  • 1 篇 bajard jean-clau...
  • 1 篇 padmavathy r.

语言

  • 8 篇 英文
检索条件"主题词=Ring-learning with errors"
8 条 记 录,以下是1-10 订阅
排序:
Faster Homomorphic Trace-Type Function Evaluation
收藏 引用
IEEE ACCESS 2021年 9卷 53061-53077页
作者: Ishimaki, Yu Yamana, Hayato Waseda Univ Tokyo 1698555 Japan Waseda Univ Fac Sci & Engn Tokyo 1698555 Japan
Homomorphic encryption enables computations over encrypted data without decryption, and can be used for outsourcing computations to some untrusted source. In homomorphic encryption based on the hardness of ring-learni... 详细信息
来源: 评论
Design and analysis of pairing protocol for bluetooth enabled devices using R-LWEL attice-based cryptography
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2017年 第Aug.期35卷 44-50页
作者: Gajbhiye, Samta Karmakar, Sanjeev Sharma, Monisha Sharma, Sanjay CSVTU SSGI SSTC Comp Sci & Engn DeptFET Bhilai Chhattisgarh India CSVTU BIT Comp Applicat Bhilai Chhattisgarh India CSVTU SSTC SSGI Elect & Telecommun DeptFET Bhilai Chhattisgarh India CSVTU BIT Dept Math Bhilai Chhattisgarh India
Secure Simple Pairing protocol of Bluetooth introduced in Bluetooth version 2.1 + EDR has security issues. Shared secret key using Elliptic Curve Diffie-Hellman algorithm generated in public key exchange phase, is sub... 详细信息
来源: 评论
cuFE: High Performance Privacy Preserving Support Vector Machine With Inner-Product Functional Encryption
收藏 引用
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING 2024年 第1期12卷 328-343页
作者: Han, Kyung Hyun Lee, Wai-Kong Karmakar, Angshuman Mera, Jose Maria Bermudo Hwang, Seong Oun Hongik Univ Dept Elect & Comp Engn Sejong 04066 South Korea Gachon Univ Dept Comp Engn Seongnam 13120 South Korea Katholieke Univ Leuven COSIC B-3000 Leuven Belgium
Privacy preservation is a sensitive issue in our modern society. It is becoming increasingly important in many applications in this ever-growing and highly connected digital era. Functional encryption is a computation... 详细信息
来源: 评论
Analysis of Error Dependencies on Newhope
收藏 引用
IEEE ACCESS 2020年 8卷 45443-45456页
作者: Song, Minki Lee, Seunghwan Shin, Dong-Joon Lee, Eunsang Kim, Young-Sik No, Jong-Seon Hanyang Univ Dept Elect & Comp Engn Seoul 04763 South Korea Seoul Natl Univ INMC Dept Elect & Comp Engn Seoul 08826 South Korea Chosun Univ Dept Informat & Commun Engn Gwangju 61452 South Korea
Among many submissions to NIST post-quantum cryptography (PQC) project, NewHope is a promising key encapsulation mechanism (KEM) based on the ring-learning with errors (ring-LWE) problem. Since NewHope is an indisting... 详细信息
来源: 评论
An efficient and light weight polynomial multiplication for ideal lattice-based cryptography
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2021年 第2期80卷 3089-3120页
作者: Yadav, Vijay Kumar Verma, Shekhar Venkatesan, S. Indian Inst Informat Technol Allahabad Devghat Allahabad 211015 UP India
ring-learning with errors (ring-LWE) based cryptographic schemes such as signature, key exchange, and encryption require polynomial multiplication. This multiplication operation is the most time consuming and computat... 详细信息
来源: 评论
Efficient Reductions in Cyclotomic rings - Application to ring-LWE Based FHE Schemes  24th
Efficient Reductions in Cyclotomic Rings - Application to Ri...
收藏 引用
24th International Conference on Selected Areas in Cryptography (SAC)
作者: Bajard, Jean-Claude Eynard, Julien Hasan, Anwar Martins, Paulo Sousa, Leonel Zucca, Vincent Sorbonne Univ LIP6 CNRS UPMC Paris France Univ Waterloo Dept Elect & Comp Engn Waterloo ON Canada Univ Lisbon Inst Super Tecn INESC ID Lisbon Portugal
With Fully Homomorphic Encryption (FHE), it is possible to process encrypted data without having an access to the private-key. This has a wide range of applications, most notably the offloading of sensitive data proce... 详细信息
来源: 评论
Lattice-Based Fine-grained Data Access Control and Sharing Scheme in Fog and Cloud Computing Environments for the 6G Systems  18
Lattice-Based Fine-grained Data Access Control and Sharing S...
收藏 引用
18th IEEE International Conference on Mobility, Sensing and Networking (MSN)
作者: Pei, Bei Zhou, Xianbin Jiang, Rui Minist Publ Secur Res Inst 3 Shanghai 200031 Peoples R China Southeast Univ Sch Cyber Sci & Engn Nanjing 210096 Peoples R China
The 6G (the sixth generation mobile communication) network is a heterogeneous network, which includes the cloud computing and the fog computing environment. And, the data securities in the 6G Systems may face great ch... 详细信息
来源: 评论
Lattice-based lightweight cryptosystem
收藏 引用
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING 2022年 第3期41卷 135-146页
作者: Jain, Shivani Padmavathy, R. NIT Warangal Dept Comp Sci & Engn Warangal 506004 Telangana India
The lattice-based cryptographic constructions are emerging as a major contender of post quantum cryptography. The power-of-2 cyclotomic rings are widely used in lattice-based solutions but these rings have limitations... 详细信息
来源: 评论