Essays about: "lattice-based cryptography"

Showing result 1 - 5 of 6 essays containing the words lattice-based cryptography.

  1. 1. Implementing and Evaluating the Quantum Resistant Cryptographic Scheme Kyber on a Smart Card

    University essay from Linköpings universitet/Informationskodning

    Author : Hampus Eriksson; [2020]
    Keywords : post-quantum; cryptography; lattice-based cryptography; quantum-resistant; Kyber; constrained device; performance; evaluation; implementation;

    Abstract : Cyber attacks happen on a daily basis, where criminals can aim to disrupt internet services or in other cases try to get hold of sensitive data. Fortunately, there are systems in place to protect these services. And one can rest assured that communication channels and data are secured under well-studied cryptographic schemes. READ MORE

  2. 2. Post-Quantum Public Key Cryptography for the Internet of Things

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi; Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Olof Magnusson; Mats Hurtig; [2019]
    Keywords : Cryptography; Post-quantum lightweight encryption; NTRUEncrypt; WolfSSL; Transport layer security; Application domain; Quantum computers;

    Abstract : Recent progress in the field of quantum computers provide radically improved muscles to search and sort in lists, solve systems of equations and prime factorize – virtues that inflict an immediate threat to the most common systems for public key cryptography used in a vast proportion of today’s computer networks. NTRUEncrypt is a lattice-based cryptography system which inhibits quantum computers for breaking the algorithm in polynomial time. READ MORE

  3. 3. Performance analysis of lattice based post-quantum secure cryptography with Java

    University essay from Umeå universitet/Institutionen för fysik

    Author : Alexander Johansson; [2019]
    Keywords : Cryptography; Post-quantum secure cryptography; Lattice-based cryptography; Learning with errors; Java;

    Abstract : Efficient quantum computers will break most of today’s public-key cryptosystems. Therefore, the National Institute of Standards and Technology (NIST) calls for proposals to standardise one or more quantum-secure cryptographic schemes. READ MORE

  4. 4. Analysis of Lattice Reduction Algorithms : Solving SVP Challenges

    University essay from Linnéuniversitetet/Institutionen för matematik (MA)

    Author : Hailay Gidey Weldu; [2018]
    Keywords : ;

    Abstract : Lattice-based cryptography which holds a great promise for post-quantum cryptographyis naturally concerned by lattice reduction algorithms, the essential tools in the algorithmicstudy of lattices and its applications. In order to precisely estimate the securityparameters of these cryptosystems, it is a necessity to assess the practical diculty of theshortest vector problem (SVP) by analyzing the known ecient algorithms for solvingit. READ MORE

  5. 5. A usability study of post-quantum algorithms

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Marcus Kindberg; [2017]
    Keywords : post-quantum cryptography; Technology and Engineering;

    Abstract : There is a non-negligible risk that a quantum computer capable of breaking most modern public key encryption will be invented within the next couple of decades. All data that have to stay secret for more than 10-20 years should therefore be encrypted using quantum-resistant algorithms. READ MORE