×
2016/11/25 · Our work shows that CCA2-secured RLWE-based encryption can be achieved with reasonable performance on constrained devices but also stresses that ...
Our work shows that CCA2-secured RLWE-based encryption can be achieved with reasonable performance on constrained devices but also stresses that the required ...
This work presents an instance of ring-LWE encryption that is protected against active attacks (i.e., adaptive chosen-ciphertext attacks) and equipped with ...
2024/05/08 · Practical CCA2-Secure and Masked Ring-LWE Implementation. IACR Cryptol. ePrint Arch. 2016: 1109 (2016); 2015. [j1]. view. electronic edition via ...
This paper exploits the additively-homomorphic property of the existing ring-LWE encryption schemes and computes an additive-mask as an encryption of a ...
In this paper, we present a masked ring-LWE decryption implementation resistant to first-order side-channel attacks. Our solution has the peculiarity that the ...
Practical CCA2-secure and masked ring-LWE implementation. T Oder, T Schneider ... Towards practical microcontroller implementation of the signature scheme Falcon.
Güneysu, “Practical CCA2-secure and masked ring-LWE implementation,” IACR Transaction Cryptographic Hardware and Embedded Systems, vol.2018, no.1, pp.142 ...
... Practical CCA2-secure and masked ring-LWE implementation. Cryptology ePrint ... masked ring-LWE implementation. In: Cryptographic hardware and embedded ...