咨询与建议

限定检索结果

文献类型

  • 281 篇 会议
  • 280 篇 期刊文献
  • 4 篇 学位论文

馆藏范围

  • 565 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 540 篇 工学
    • 480 篇 计算机科学与技术...
    • 194 篇 电气工程
    • 129 篇 信息与通信工程
    • 88 篇 软件工程
    • 26 篇 电子科学与技术(可...
    • 19 篇 网络空间安全
    • 10 篇 控制科学与工程
    • 9 篇 交通运输工程
    • 3 篇 仪器科学与技术
    • 2 篇 机械工程
    • 2 篇 动力工程及工程热...
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 土木工程
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 安全科学与工程
  • 132 篇 理学
    • 109 篇 数学
    • 25 篇 物理学
    • 3 篇 系统科学
    • 2 篇 化学
  • 21 篇 管理学
    • 19 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 公共管理
  • 10 篇 军事学
    • 10 篇 军队指挥学
  • 2 篇 医学
    • 2 篇 公共卫生与预防医...
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
  • 1 篇 法学
    • 1 篇 政治学
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 565 篇 lattice-based cr...
  • 119 篇 post-quantum cry...
  • 32 篇 cryptography
  • 28 篇 number theoretic...
  • 27 篇 learning with er...
  • 25 篇 homomorphic encr...
  • 25 篇 security
  • 24 篇 ntru
  • 23 篇 authentication
  • 23 篇 encryption
  • 22 篇 lwe
  • 21 篇 cryptanalysis
  • 20 篇 fpga
  • 19 篇 ring-lwe
  • 18 篇 kyber
  • 17 篇 quantum computin...
  • 17 篇 lattices
  • 15 篇 internet of thin...
  • 15 篇 provable securit...
  • 14 篇 side-channel ana...

机构

  • 12 篇 tech univ darmst...
  • 10 篇 tsinghua univ de...
  • 8 篇 univ chinese aca...
  • 8 篇 xidian univ stat...
  • 7 篇 state key lab cr...
  • 6 篇 chinese acad sci...
  • 6 篇 univ rennes cnrs...
  • 6 篇 tsinghua univ in...
  • 6 篇 ondokuz mayis un...
  • 5 篇 tsinghua univ in...
  • 5 篇 univ minnesota d...
  • 5 篇 monash univ fac ...
  • 5 篇 lund univ dept e...
  • 5 篇 orange labs appl...
  • 5 篇 nanyang technol ...
  • 4 篇 clemson univ dep...
  • 4 篇 wuhan univ sch c...
  • 4 篇 pqshield ltd oxf...
  • 4 篇 royal holloway u...
  • 4 篇 nanyang technol ...

作者

  • 21 篇 akleylek sedat
  • 12 篇 steinfeld ron
  • 11 篇 roux-langlois ad...
  • 10 篇 hu yupu
  • 10 篇 susilo willy
  • 9 篇 roy sujoy sinha
  • 9 篇 sakzad amin
  • 8 篇 buchmann johanne...
  • 8 篇 lee wai-kong
  • 8 篇 howe james
  • 8 篇 seyhan kubra
  • 8 篇 khalid ayesha
  • 8 篇 wang huaxiong
  • 7 篇 zhang yanhua
  • 7 篇 guo qian
  • 7 篇 bindel nina
  • 6 篇 jeudy corentin
  • 6 篇 plantard thomas
  • 6 篇 jia huiwen
  • 6 篇 lee hanho

语言

  • 558 篇 英文
  • 4 篇 其他
  • 3 篇 中文
检索条件"主题词=lattice-based cryptography"
565 条 记 录,以下是1-10 订阅
排序:
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks
收藏 引用
Digital Communications and Networks 2024年 第4期10卷 989-1000页
作者: Kumar Sekhar Roy Subhrajyoti Deb Hemanta Kumar Kalita Department of Computer Science and Engineering Manipal Institute of Technology BengaluruManipal Academy of Higher EducationManipal576104KarnatakaIndia Department of Computer Science&Engineering ICFAI UniversityAgartala799210India Department of Computer Science&Engineering Central Institute of TechnologyKokrajhar783370India
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** the... 详细信息
来源: 评论
On Practical Discrete Gaussian Samplers for lattice-based cryptography
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 2018年 第3期67卷 322-334页
作者: Howe, James Khalid, Ayesha Rafferty, Ciara Regazzoni, Francesco O'Neill, Maire Queens Univ Belfast CSIT Belfast BT7 1NN Antrim North Ireland Univ Svizzera Italiana Adv Learning & Res Inst CH-6900 Lugano Switzerland
lattice-based cryptography is one of the most promising branches of quantum resilient cryptography, offering versatility and efficiency. Discrete Gaussian samplers are a core building block in most, if not all, lattic... 详细信息
来源: 评论
Revisiting Higher-Order Masked Comparison for lattice-based cryptography: Algorithms and Bit-Sliced Implementations
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 2023年 第2期72卷 321-332页
作者: D'Anvers, Jan-Pieter Van Beirendonck, Michiel Verbauwhede, Ingrid Katholieke Univ Leuven Imec COSIC Leuven Belgium
Marked comparison is one of the most expensive operations in side-channel secure implementations of lattice-based post-quantum cryptography, especially for higher masking orders. First, we introduce two new masked com... 详细信息
来源: 评论
Sparse polynomial multiplication for lattice-based cryptography with small complexity
收藏 引用
JOURNAL OF SUPERCOMPUTING 2016年 第2期72卷 438-450页
作者: Akleylek, Sedat Alkim, Erdem Tok, Zaliha Yuce Tech Univ Darmstadt Cryptog & Comp Algebra Grp Darmstadt Germany Ondokuz Mayis Univ Dept Comp Engn Samsun Turkey Ege Univ Dept Math Izmir Turkey Middle E Tech Univ Inst Appl Math TR-06531 Ankara Turkey
In this paper, we propose efficient modular polynomial multiplication methods with applications in lattice-based cryptography. We provide a sparse polynomial multiplication to be used in the quotient ring (Z/pZ)[x]/(x... 详细信息
来源: 评论
Exploring Energy Efficient Architectures for RLWE lattice-based cryptography
收藏 引用
JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY 2021年 第10期93卷 1139-1148页
作者: Nejatollahi, Hamid Shahhosseini, Sina Cammarota, Rosario Dutt, Nikil Univ Calif Irvine Irvine CA 92697 USA Intel AI Privacy & Secur Res Hillsboro OR USA
Quantum computers are imminent threat to secure signal processing because they can break the contemporary public-key cryptography schemes in polynomial time. Ring learning with error (RLWE) lattice-based cryptography ... 详细信息
来源: 评论
High-Speed VLSI Architectures for Modular Polynomial Multiplication via Fast Filtering and Applications to lattice-based cryptography
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 2023年 第9期72卷 2454-2466页
作者: Tan, Weihang Wang, Antian Zhang, Xinmiao Lao, Yingjie Parhi, Keshab K. K. Univ Minnesota Dept Elect & Comp Engn Minneapolis MN 55455 USA Clemson Univ Dept Elect & Comp Engn Clemson SC 29634 USA Ohio State Univ Dept Elect & Comp Engn Columbus OH 43210 USA
This paper presents a low-latency hardware accelerator for modular polynomial multiplication for lattice-based post-quantum cryptography and homomorphic encryption applications. The proposed novel modular polynomial m... 详细信息
来源: 评论
TensorCrypto: High Throughput Acceleration of lattice-based cryptography Using Tensor Core on GPU
收藏 引用
IEEE ACCESS 2022年 10卷 20616-20632页
作者: Lee, Wai-Kong Seo, Hwajeong Zhang, Zhenfei Hwang, Seong Oun Gachon Univ Dept Comp Engn Seongnam 13120 South Korea Hansung Univ Coll IT Engn Seoul 02876 South Korea Ethereum Fdn CH-6300 Zug Switzerland
Tensor core is a newly introduced hardware unit in NVIDIA GPU chips that allows matrix multiplication to be computed much faster than in the integer and floating-point units. In this paper, we show that for the first ... 详细信息
来源: 评论
Configurable Mixed-Radix Number Theoretic Transform Architecture for lattice-based cryptography
收藏 引用
IEEE ACCESS 2022年 10卷 12732-12741页
作者: Phap Duong-Ngoc Lee, Hanho Inha Univ Dept Informat & Commun Engn Incheon 22212 South Korea
lattice-based cryptography continues to dominate in the second-round finalists of the National Institute of Standards and Technology post-quantum cryptography standardization process. Computational efficiency is prima... 详细信息
来源: 评论
An efficient and light weight polynomial multiplication for ideal lattice-based cryptography
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2021年 第2期80卷 3089-3120页
作者: Yadav, Vijay Kumar Verma, Shekhar Venkatesan, S. Indian Inst Informat Technol Allahabad Devghat Allahabad 211015 UP India
Ring-Learning With Errors (Ring-LWE) based cryptographic schemes such as signature, key exchange, and encryption require polynomial multiplication. This multiplication operation is the most time consuming and computat... 详细信息
来源: 评论
The implementation of polynomial multiplication for lattice-based cryptography: A survey
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2024年 83卷
作者: Zeng, Chenkai He, Debiao Feng, Qi Peng, Cong Luo, Min Wuhan Univ Sch Cyber Sci & Engn Key Lab Aerosp Informat Secur & Trusted Comp Minist Educ Wuhan 430072 Peoples R China Qilu Univ Technol Shandong Acad Sci Shandong Comp Sci Ctr Key Lab Comp Power Network & Informat SecurMinist Jinan 250014 Peoples R China Shanghai Technol Innovat Ctr Distributed Privacy P Matrix Elements Technol Shanghai 200232 Peoples R China
The advent of quantum computing threatens the security of traditional public -key cryptography. Algorithms for quantum computing have the ability to solve the large prime factorization and the discrete logarithm probl... 详细信息
来源: 评论