Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
40
views
27
references
Top references
cited by
21
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,735
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems
other
Author(s):
Tim Güneysu
,
Vadim Lyubashevsky
,
Thomas Pöppelmann
Publication date
(Print):
2012
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Socioecological systems
Most cited references
27
Record
: found
Abstract
: not found
Article
: not found
Security Arguments for Digital Signatures and Blind Signatures
David Pointcheval
,
Jacques Stern
(2000)
0
comments
Cited
211
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
NTRU: A ring-based public key cryptosystem
Jeffrey Hoffstein
,
Jill Pipher
,
Joseph Silverman
(1998)
0
comments
Cited
151
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Public-key cryptosystems from lattice reduction problems
Oded Goldreich
,
Shafi Goldwasser
,
Shai Halevi
(1997)
0
comments
Cited
55
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2012
Pages
: 530-547
DOI:
10.1007/978-3-642-33027-8_31
SO-VID:
8bde3ba7-e572-456c-b588-fdbf8bae81eb
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
3D Hardware Canaries
pp. 23
Breakthrough Silicon Scanning Discovers Backdoor in Military Chip
pp. 41
Simple Photonic Emission Analysis of AES
pp. 58
Compiler Assisted Masking
pp. 76
Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes
pp. 92
How Far Should Theory Be from Practice?
pp. 107
Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean Masking
pp. 122
A Differential Fault Attack on the Grain Family of Stream Ciphers
pp. 140
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
pp. 155
Selecting Time Samples for Multivariate DPA Attacks
pp. 175
Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting
pp. 193
Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
pp. 213
Practical Leakage-Resilient Symmetric Cryptography
pp. 233
A Statistical Model for DPA with Novel Algorithmic Confusion Analysis
pp. 251
Practical Security Analysis of PUF-Based Two-Player Protocols
pp. 268
Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment
pp. 283
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon
pp. 302
PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator
pp. 320
NEON Crypto
pp. 340
Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware
pp. 356
Solving Quadratic Equations with XL on Parallel Architectures
pp. 374
Efficient Implementations of MQPKS on Constrained Devices
pp. 390
Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint
pp. 408
Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice Implementation
pp. 426
Low-Latency Encryption – Is “Lightweight = Light + Wait”?
pp. 447
Attacking RSA–CRT Signatures with Faults on Montgomery Multiplication
pp. 463
Reduce-by-Feedback: Timing Resistant and DPA-Aware Modular Multiplication Plus: How to Break RSA by DPA
pp. 476
Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents
pp. 494
Pushing the Limits of High-Speed GF(2 m ) Elliptic Curve Scalar Multiplication on FPGAs
pp. 512
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes
pp. 530
Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems
pp. 548
An Efficient Countermeasure against Correlation Power-Analysis Attacks with Randomized Montgomery Operations for DF-ECC Processor
Similar content
2,735
Mathematical methods in solutions of the problems from the Third International Students' Olympiad in Cryptography
Authors:
G. Shushuev
,
N. Kolomeec
,
V. Idrisova
…
Disorder generated by interacting neural networks: application to econophysics and cryptography
Authors:
Wolfgang Kinzel
,
Ido Kanter
Optimal Multisecret Image Sharing Using Lightweight Visual Sign-Cryptography Scheme With Optimal Key Generation for Gray/Color Images
Authors:
Pramod M. Bachiphale
,
Nitish Zulpe
See all similar
Cited by
21
Lattice Signatures and Bimodal Gaussians
Authors:
Léo Ducas
,
Alain Durmus
,
Tancrède Lepoint
…
A Toolkit for Ring-LWE Cryptography
Authors:
Vadim Lyubashevsky
,
Chris Peikert
,
Oded Regev
An Improved Compression Technique for Signatures Based on Learning with Errors
Authors:
Shi Bai
,
Steven D. Galbraith
See all cited by