咨询与建议

限定检索结果

文献类型

  • 281 篇 会议
  • 280 篇 期刊文献
  • 4 篇 学位论文

馆藏范围

  • 565 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 540 篇 工学
    • 480 篇 计算机科学与技术...
    • 194 篇 电气工程
    • 129 篇 信息与通信工程
    • 88 篇 软件工程
    • 26 篇 电子科学与技术(可...
    • 19 篇 网络空间安全
    • 10 篇 控制科学与工程
    • 9 篇 交通运输工程
    • 3 篇 仪器科学与技术
    • 2 篇 机械工程
    • 2 篇 动力工程及工程热...
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 土木工程
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 安全科学与工程
  • 132 篇 理学
    • 109 篇 数学
    • 25 篇 物理学
    • 3 篇 系统科学
    • 2 篇 化学
  • 21 篇 管理学
    • 19 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 公共管理
  • 10 篇 军事学
    • 10 篇 军队指挥学
  • 2 篇 医学
    • 2 篇 公共卫生与预防医...
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
  • 1 篇 法学
    • 1 篇 政治学
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 565 篇 lattice-based cr...
  • 119 篇 post-quantum cry...
  • 32 篇 cryptography
  • 28 篇 number theoretic...
  • 27 篇 learning with er...
  • 25 篇 homomorphic encr...
  • 25 篇 security
  • 24 篇 ntru
  • 23 篇 authentication
  • 23 篇 encryption
  • 22 篇 lwe
  • 21 篇 cryptanalysis
  • 20 篇 fpga
  • 19 篇 ring-lwe
  • 18 篇 kyber
  • 17 篇 quantum computin...
  • 17 篇 lattices
  • 15 篇 internet of thin...
  • 15 篇 provable securit...
  • 14 篇 side-channel ana...

机构

  • 12 篇 tech univ darmst...
  • 10 篇 tsinghua univ de...
  • 8 篇 univ chinese aca...
  • 8 篇 xidian univ stat...
  • 7 篇 state key lab cr...
  • 6 篇 chinese acad sci...
  • 6 篇 univ rennes cnrs...
  • 6 篇 tsinghua univ in...
  • 6 篇 ondokuz mayis un...
  • 5 篇 tsinghua univ in...
  • 5 篇 univ minnesota d...
  • 5 篇 monash univ fac ...
  • 5 篇 lund univ dept e...
  • 5 篇 orange labs appl...
  • 5 篇 nanyang technol ...
  • 4 篇 clemson univ dep...
  • 4 篇 wuhan univ sch c...
  • 4 篇 pqshield ltd oxf...
  • 4 篇 royal holloway u...
  • 4 篇 nanyang technol ...

作者

  • 21 篇 akleylek sedat
  • 12 篇 steinfeld ron
  • 11 篇 roux-langlois ad...
  • 10 篇 hu yupu
  • 10 篇 susilo willy
  • 9 篇 roy sujoy sinha
  • 9 篇 sakzad amin
  • 8 篇 buchmann johanne...
  • 8 篇 lee wai-kong
  • 8 篇 howe james
  • 8 篇 seyhan kubra
  • 8 篇 khalid ayesha
  • 8 篇 wang huaxiong
  • 7 篇 zhang yanhua
  • 7 篇 guo qian
  • 7 篇 bindel nina
  • 6 篇 jeudy corentin
  • 6 篇 plantard thomas
  • 6 篇 jia huiwen
  • 6 篇 lee hanho

语言

  • 558 篇 英文
  • 4 篇 其他
  • 3 篇 中文
检索条件"主题词=lattice-based cryptography"
565 条 记 录,以下是41-50 订阅
排序:
Extended version: enabling lattice-based post-quantum cryptography on the opentitan platform
收藏 引用
JOURNAL OF CRYPTOGRAPHIC ENGINEERING 2025年 第2期15卷 1-23页
作者: Stelzer, Tobias Oberhansl, Felix Schupp, Jonas Karl, Patrick Turcuman, Horia Fraunhofer AISEC Garching Germany Tech Univ Munich TUM Sch Computat Informat & Technol Munich Germany
The first generation of post-quantum cryptography (PQC) standards by the National Institute of Standards and Technology (NIST) is just around the corner. The need for secure implementations is therefore increasing. In... 详细信息
来源: 评论
Efficient Partially-parallel NTT Processor for lattice-based Post-quantum cryptography
收藏 引用
JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE 2022年 第6期22卷 459-474页
作者: Choi, Soyeon Shin, Yerin Lim, Kiho Yoo, Hoyoung Chungnam Natl Univ Dept Elect Engn Daejeon 34134 South Korea LX Semicon Daejeon 34027 South Korea William Paterson Univ New Jersey Wayne NJ 07470 USA
This paper presents a partially-parallel number theoretic transform (NTT) processor design for polynomial multipliers, which is a key component of a lattice-based cryptography. Since the data flow of NTT is similar to... 详细信息
来源: 评论
Scabbard: An Exploratory Study on Hardware Aware Design Choices of Learning with Rounding-based Key Encapsulation Mechanisms
收藏 引用
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS 2025年 第1期24卷 1-40页
作者: Kundu, Suparna TEN Norga, Quin Karmakar, Angsh uman Gangopadh, Shreya Mera, Jose maria bermudo Whede, Ingrid verbau Katholieke Univ Leuven COSIC Dept Rehabil Sci Leuven Flemish Brabant Belgium Indian Inst Technol Kanpur Comp Sci & Engn Kanpur Uttar Pradesh India IIT KHARAGPUR Kharagpur W Bengal India PQShield Oxford England
Recently, the construction of cryptographic schemes based on hard lattice problems has gained immense popularity. Apart from being quantum resistant, lattice-based cryptography allows a wide range of variations in the... 详细信息
来源: 评论
Quantum Safe Multi-Factor User Authentication Protocol for Cloud-Assisted Medical IoT
收藏 引用
IEEE ACCESS 2025年 13卷 3532-3545页
作者: Ahmad, Arman Jagatheswari, S. Vellore Inst Technol Sch Adv Sci Dept Math Vellore 632014 Tamil Nadu India
The Medical Internet of Things (MIoT) plays a pivotal role in modern healthcare by integrating wireless communication and cloud computing to enhance medical practices. However, this framework presents security vulnera... 详细信息
来源: 评论
lattice-based Zero-Knowledge Proofs in Action: Applications to Electronic Voting
收藏 引用
JOURNAL OF CRYPTOLOGY 2025年 第1期38卷 1-33页
作者: Farzaliyev, Valeh Parn, Calvin Saarse, Heleen Willemson, Jan Cybernet AS Narva Mnt 20 EE-51009 Tartu Estonia Tartu Univ Inst Comp Sci Narva mnt 18 EE-51009 Tartu Estonia Tartu Univ Inst Math & Stat Narva Mnt 18 EE-51009 Tartu Estonia
This paper studies several building blocks needed for electronic voting in order to prepare for the post-quantum era. In particular, we present lattice-based constructions for a generic zero-knowledge (ZK) proof of ba... 详细信息
来源: 评论
Enabling lattice-based Post-Quantum cryptography on the OpenTitan Platform  7
Enabling Lattice-Based Post-Quantum Cryptography on the Open...
收藏 引用
7th Workshop on Attacks and Solutions in Hardware Security (ASHES)
作者: Stelzer, Tobias Oberhansl, Felix Schupp, Jonas Karl, Patrick Fraunhofer AISEC Garching Germany Tech Univ Munich Munich Germany TUM Sch Computat Informat & Technol Munich Germany
The first generation of post-quantum cryptography (PQC) standards by the National Institute of Standards and Technology (NIST) is just around the corner. The need for secure implementations is therefore increasing. In... 详细信息
来源: 评论
Blockchain based lightweight authentication scheme for internet of things using lattice encryption algorithm
收藏 引用
COMPUTER STANDARDS & INTERFACES 2025年 93卷
作者: Kuang, Yingpan Wu, Qiwen Chen, Riqing Liu, Xiaolong Fujian Agr & Forestry Univ Coll Comp & Informat Sci Fuzhou 350002 Peoples R China Fujian Agr & Forestry Univ Ctr Agroforestry Mega Data Sci Sch Future Technol Fuzhou 350002 Peoples R China
With the rapid development of the Internet of Things (IoT), robust and secure authentication among interconnected devices has become increasingly significant. Existing cryptographic methods, despite their effectivenes... 详细信息
来源: 评论
LPbT-SSO: Password-based Threshold Single-Sign-On Authentication From LWE
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2025年 第1期22卷 491-504页
作者: Cao, Chenchen Xu, Chunxiang Jiang, Changsong Zhang, Zhao Dong, Xinfeng Chen, Kefei Univ Elect Sci & Technol China Sch Comp Sci & Engn Chengdu 611731 Peoples R China Univ Elect Sci & Technol China Yangtze Delta Reg Inst Huzhou Huzhou 313001 Peoples R China Sci & Technol Commun Secur Lab Chengdu 610041 Peoples R China Hangzhou Normal Univ Dept Math Hangzhou 310027 Peoples R China
In networks, clients access various servers. Servers need to authenticate clients' identities and provide services to clients who pass the authentication. Password-based threshold single-sign-on authentication (Pb... 详细信息
来源: 评论
PPLBB: a novel privacy-preserving lattice-based blockchain platform in IoMT
收藏 引用
JOURNAL OF SUPERCOMPUTING 2025年 第1期81卷 1-33页
作者: Sezer, Bora Bugra Akleylek, Sedat Ege Univ Grad Sch Nat & Appl Sci Izmir Turkiye Istinye Univ Dept Comp Engn Istanbul Turkiye Univ Tartu Inst Comp Sci Tartu Estonia
This paper proposes a quantum-secure, privacy-preserving blockchain platform for the Internet of Medical Things (IoMT). It defines a solution to quantum attacks on blockchain by integrating the Dilithium lattice-based... 详细信息
来源: 评论
Optimizing parameters for efficient computation with fully homomorphic encryption schemes
收藏 引用
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES 2025年 第2期33卷 106-126页
作者: Karaagac, Cavidan Yakupoglu Rohloff, Kurt Abdullah Gill Univ Dept Comp Engn TR-38039 Kayseri Turkiye New Jersey Inst Technol Ying Wu Coll Comp Dept Comp Sci Newark NJ USA
In this study, we aim to provide a parameter selection approach for the BFVrns scheme, one of the prominent fully homomorphic encryption (FHE) schemes. Selecting parameters for lattice-based FHE schemes poses a practi... 详细信息
来源: 评论