-
1Academic Journal
المؤلفون: Iason Papadopoulos, Jiabo Wang
المصدر: Cryptography; Volume 7; Issue 1; Pages: 2
مصطلحات موضوعية: Kyber, Polar Codes, public key encryption, module LWE, decryption failure rate, post-quantum security
وصف الملف: application/pdf
Relation: Hardware Security; https://dx.doi.org/10.3390/cryptography7010002
-
2Academic Journal
المؤلفون: Tuy Tan Nguyen, Tram Thi Bao Nguyen, Hanho Lee
المصدر: Electronics; Volume 11; Issue 6; Pages: 891
مصطلحات موضوعية: CRYSTALS-Kyber, number theoretic transform (NTT), module-LWE, public-key encryption, key establishment
وصف الملف: application/pdf
Relation: Computer Science & Engineering; https://dx.doi.org/10.3390/electronics11060891
-
3Academic Journal
المؤلفون: Yufei Xing, Shuguo Li
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 2 (2021)
مصطلحات موضوعية: CRYSTALS-KYBER, post-quantum cryptography, key exchange mechanism, Module-LWE, full hardware implementation, Computer engineering. Computer hardware, TK7885-7895, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
4Academic Journal
المؤلفون: Xing, Yufei, Li, Shuguo
المصدر: IACR Transactions on Cryptographic Hardware and Embedded Systems; Volume 2021, Issue 2; 328-356 ; 2569-2925
مصطلحات موضوعية: CRYSTALS-KYBER, post-quantum cryptography, key exchange mechanism, Module-LWE, full hardware implementation
وصف الملف: application/pdf
-
5Academic Journal
المؤلفون: Escribano Pablos, Jose Ignacio, González Vasco, María Isabel, Marriaga Castillo, Misael Enrique, Perez Del Pozo, Angel Luis
المساهمون: Ministerio de Economía y Competitividad (España)
مصطلحات موضوعية: Group authenticated key exchange, Kyber, Module-LWE, Post-Quantum Cryptography, Matemáticas
Relation: Gobierno de España. MTM2016-77213-R; Gobierno de España. PID2019-109379RB-I00; Escribano Pablos, J. I., González Vasco, M. I., Marriaga, M. E., & Pérez del Pozo, N. L. (2020). Compiled Constructions towards Post-Quantum Group Key Exchange: A Design from Kyber. Mathematics, 8(10), 1853.; http://hdl.handle.net/10016/36770; https://doi.org/10.3390/math8101853; 10, 1853; 23; Mathematics; AR/0000032354
-
6Academic Journal
المؤلفون: Utsav Banerjee, Tenzin S. Ukyab, Anantha P. Chandrakasan
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2019, Iss 4 (2019)
مصطلحات موضوعية: Lattice-based Cryptography, LWE, Ring-LWE, Module-LWE, postquantum, NIST Round 2, Computer engineering. Computer hardware, TK7885-7895, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
7Academic Journal
المؤلفون: Banerjee, Utsav, Ukyab, Tenzin S., Chandrakasan, Anantha P.
المصدر: IACR Transactions on Cryptographic Hardware and Embedded Systems; Volume 2019, Issue 4; 17-61 ; 2569-2925
مصطلحات موضوعية: Lattice-based Cryptography, LWE, Ring-LWE, Module-LWE, postquantum, NIST Round 2, Number Theoretic Transform, Sampling, energy-efficient, low-power, constant-time, side-channel security, ASIC, hardware implementation
وصف الملف: application/pdf
-
8
المؤلفون: María Isabel González Vasco, Angel L. Pérez del Pozo, Misael E. Marriaga, José Ignacio Escribano Pablos
المساهمون: Ministerio de Economía y Competitividad (España)
المصدر: Mathematics
Volume 8
Issue 10
Mathematics, Vol 8, Iss 1853, p 1853 (2020)مصطلحات موضوعية: Theoretical computer science, Computer science, Matemáticas, General Mathematics, Cryptography, 02 engineering and technology, Encryption, 01 natural sciences, 010305 fluids & plasmas, Random oracle, group authenticated key exchange, 0103 physical sciences, 0202 electrical engineering, electronic engineering, information engineering, Computer Science (miscellaneous), Engineering (miscellaneous), Key exchange, Kyber, Post-quantum cryptography, Authentication, business.industry, lcsh:Mathematics, lcsh:QA1-939, post-quantum cryptography, Authenticated Key Exchange, Key (cryptography), Post-Quantum Cryptography, 020201 artificial intelligence & image processing, Group authenticated key exchange, business, Module-LWE
وصف الملف: application/pdf