When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Lattice-based cryptography - Wikipedia

    en.wikipedia.org/wiki/Lattice-based_cryptography

    Lattice-based constructions support important standards of post-quantum cryptography. [1] Unlike more widely used and known public-key schemes such as the RSA , Diffie-Hellman or elliptic-curve cryptosystems — which could, theoretically, be defeated using Shor's algorithm on a quantum computer — some lattice-based constructions appear to be ...

  3. Lattice problem - Wikipedia

    en.wikipedia.org/wiki/Lattice_problem

    In computer science, lattice problems are a class of optimization problems related to mathematical objects called lattices.The conjectured intractability of such problems is central to the construction of secure lattice-based cryptosystems: lattice problems are an example of NP-hard problems which have been shown to be average-case hard, providing a test case for the security of cryptographic ...

  4. Short integer solution problem - Wikipedia

    en.wikipedia.org/wiki/Short_integer_solution_problem

    The Short Integer Solution (SIS) problem is an average case problem that is used in lattice-based cryptography constructions. Lattice-based cryptography began in 1996 from a seminal work by Ajtai [ 1 ] who presented a family of one-way functions based on the SIS problem.

  5. NTRU - Wikipedia

    en.wikipedia.org/wiki/NTRU

    NTRU is an open-source public-key cryptosystem that uses lattice-based cryptography to encrypt and decrypt data. It consists of two algorithms: NTRUEncrypt, which is used for encryption, and NTRUSign, which is used for digital signatures.

  6. Computational hardness assumption - Wikipedia

    en.wikipedia.org/wiki/Computational_hardness...

    Computational hardness assumptions are of particular importance in cryptography. A major goal in cryptography is to create cryptographic primitives with provable security. In some cases, cryptographic protocols are found to have information theoretic security; the one-time pad is a common example. However, information theoretic security cannot ...

  7. GGH encryption scheme - Wikipedia

    en.wikipedia.org/wiki/GGH_encryption_scheme

    In 1999, Nguyen [1] showed that the GGH encryption scheme has a flaw in the design. He showed that every ciphertext reveals information about the plaintext and that the problem of decryption could be turned into a special closest vector problem much easier to solve than the general CVP.

  8. BLISS signature scheme - Wikipedia

    en.wikipedia.org/wiki/BLISS_signature_scheme

    Current signature schemes rely either on integer factorization, discrete logarithm or elliptic curve discrete logarithm problem, all of which can be effectively attacked by a quantum computer. BLISS on the other hand, is a post-quantum algorithm, and is meant to resist quantum computer attacks.

  9. Category:Lattice-based cryptography - Wikipedia

    en.wikipedia.org/wiki/Category:Lattice-based...

    Download QR code; Print/export Download as PDF; ... Pages in category "Lattice-based cryptography" The following 17 pages are in this category, out of 17 total.