20
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Post-Quantum Cryptography 

      Additively Homomorphic Ring-LWE Masking

      other

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references20

          • Record: found
          • Abstract: not found
          • Article: not found

          Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer

            Bookmark
            • Record: found
            • Abstract: not found
            • Book Chapter: not found

            Differential Power Analysis

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems

                Bookmark

                Author and book information

                Book Chapter
                2016
                February 04 2016
                : 233-244
                10.1007/978-3-319-29360-8_15
                f506fe09-abaa-49ac-8b3f-9312ac179644
                History

                Comments

                Comment on this book

                Book chapters

                Similar content3,032

                Cited by2