When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Lattice-based cryptography - Wikipedia

    en.wikipedia.org/wiki/Lattice-based_cryptography

    Lattice-based cryptography is the generic term for constructions of cryptographic primitives that involve lattices, either in the construction itself or in the security proof. Lattice-based constructions support important standards of post-quantum cryptography . [ 1 ]

  3. Short integer solution problem - Wikipedia

    en.wikipedia.org/wiki/Short_integer_solution_problem

    Lattice-based cryptography began in 1996 from a seminal work by Ajtai [1] who presented a family of one-way functions based on the SIS problem. He showed that it is secure in an average case if S V P γ {\displaystyle \mathrm {SVP} _{\gamma }} (where γ = n c {\displaystyle \gamma =n^{c}} for some constant c > 0 {\displaystyle c>0} ) is hard in ...

  4. Lattice problem - Wikipedia

    en.wikipedia.org/wiki/Lattice_problem

    In computer science, lattice problems are a class of optimization problems related to mathematical objects called lattices.The conjectured intractability of such problems is central to the construction of secure lattice-based cryptosystems: lattice problems are an example of NP-hard problems which have been shown to be average-case hard, providing a test case for the security of cryptographic ...

  5. NTRU - Wikipedia

    en.wikipedia.org/wiki/NTRU

    NTRU is an open-source public-key cryptosystem that uses lattice-based cryptography to encrypt and decrypt data. It consists of two algorithms: NTRUEncrypt, which is used for encryption, and NTRUSign, which is used for digital signatures. Unlike other popular public-key cryptosystems, it is resistant to attacks using Shor's algorithm ...

  6. Learning with errors - Wikipedia

    en.wikipedia.org/wiki/Learning_with_errors

    In cryptography, learning with errors (LWE) is a mathematical problem that is widely used to create secure encryption algorithms. [1] It is based on the idea of representing secret information as a set of equations with errors. In other words, LWE is a way to hide the value of a secret by introducing noise to it. [2]

  7. Ring learning with errors signature - Wikipedia

    en.wikipedia.org/wiki/Ring_learning_with_errors...

    Another approach to signatures based on lattices over Rings is a variant of the patented NTRU family of lattice based cryptography. The primary example of this approach is a signature known as the Bimodal Lattice Signature Scheme (BLISS). It was developed by Ducas, Durmas, Lepoint and Lyubashevsky and documented in their paper "Lattice ...

  8. Ring learning with errors - Wikipedia

    en.wikipedia.org/wiki/Ring_learning_with_errors

    An important feature of basing cryptography on the ring learning with errors problem is the fact that the solution to the RLWE problem can be used to solve a version of the shortest vector problem (SVP) in a lattice (a polynomial-time reduction from this SVP problem to the RLWE problem has been presented [1]).

  9. Ring learning with errors key exchange - Wikipedia

    en.wikipedia.org/wiki/Ring_learning_with_errors...

    Further q will be an odd prime such that q is congruent to 1 mod 4 and 1 mod 2n. Other cases for q and n are thoroughly discussed in "A Toolkit for Ring-LWE Cryptography" and in Singh's "Even More Practical Key Exchange for the Internet using Lattice Cryptography." [9] [10] and another paper by Singh. A fixed public polynomial, a(x), shared by ...