A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Masking ring-LWE
2016
Journal of Cryptographic Engineering
In this paper we present a compact masked implementation of the ring-LWE decryption function. ...
In the following, we are not analyzing the variant of [5] but only the half-masked ring-LWE.) ...
doi:10.1007/s13389-016-0126-5
fatcat:se3otguhwjabbg5gzpqvmecs3i
Additively Homomorphic Ring-LWE Masking
[chapter]
2016
Lecture Notes in Computer Science
A first step in a masked ring-LWE implementation is the work [RRVV15] , hereafter refered to as the CHES 2015 approach. ...
In this paper we propose a new masking scheme to protect the secret key during decryption operations in ring-LWE cryptosystems. ...
doi:10.1007/978-3-319-29360-8_15
fatcat:sqy3uce2f5ehfkycte7v425ulm
A Masked Ring-LWE Implementation
[chapter]
2015
Lecture Notes in Computer Science
In this paper, we present a masked ring-LWE decryption implementation resistant to first-order side-channel attacks. ...
We have implemented a hardware architecture of the masked ring-LWE processor on a Virtex-II FPGA, and have performed side channel analysis to confirm the soundness of our approach. ...
Our implementation performs the entire ring-LWE decryption computation in the masked domain. ...
doi:10.1007/978-3-662-48324-4_34
fatcat:o3dq35tsb5hf3ibzarhva6zj2m
Practical CCA2-Secure and Masked Ring-LWE Implementation
2018
Transactions on Cryptographic Hardware and Embedded Systems
During the last years public-key encryption schemes based on the hardness of ring-LWE have gained significant popularity. ...
In this work we thus present an instance of ring-LWE encryption that is protected against active attacks (i.e., adaptive chosen-ciphertext attacks) and equipped with countermeasures against side-channel ...
Figure 2 shows the basic structure of our masked ring-LWE decryption. ...
doi:10.13154/tches.v2018.i1.142-174
dblp:journals/tches/OderSPG18
fatcat:h4cn4y677bfwtbhqhxax7iy3ae
Ring-LWE: Applications to Cryptography and Their Efficient Realization
[chapter]
2016
Lecture Notes in Computer Science
Later for efficiency LWE was adapted for ring polynomials known as Ring-LWE. In this paper we discuss some of these ring-LWE based schemes that have been designed. ...
The secret in a ring-LWE based scheme is a polynomial and arithmetic operations involve masking data and the secret using discrete Gaussian noise. ...
The search ring-LWE problem is to find the secret polynomial s(x) from a polynomial number of samples drawn from the ring-LWE distribution. ...
doi:10.1007/978-3-319-49445-6_18
fatcat:7y34eqtumvhexap5rusvgjzppy
Physical Protection of Lattice-Based Cryptography
2018
Proceedings of the 2018 on Great Lakes Symposium on VLSI - GLSVLSI '18
In the case of ring lattices the security of the constructed schemes is based on ring variants of the original problems, hence, the Ring-Learning with Errors (R-LWE) or Ring-Short Integer Solution (R-SIS ...
Masking has also been applied to R-LWE-based schemes in several works [26, 33, 34] . ...
doi:10.1145/3194554.3194616
dblp:conf/glvlsi/KhalidOVOGR18
fatcat:lfintj5vbbf5xllxwoxeer6hdu
Compact Lattice Signatures
2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications
This is an instance of Ring LWE. ...
a generalized version of the Ring SIS (or ring LWE) problem. ...
doi:10.5220/0006861606560661
dblp:conf/icete/DasS18
fatcat:eawydz6lkzax3azbovor4p5ujm
Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols
[article]
2019
arXiv
pre-print
We also discuss how masking-based DPA countermeasures can be implemented on the Sapphire core without any changes to the hardware. ...
Masking-based countermeasures have been proposed in [67, 68, 46] for Ring-LWE encryption. ...
Examples of secure Ring-LWE parameters are (n, q) = (512, 12289) and (n, q) = (1024, 12289) for NewHope [24] . Module-LWE [6] provides a middle ground between LWE and Ring-LWE. ...
arXiv:1910.07557v1
fatcat:suymd56szfe5fas2vxncdbu5h4
High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption
2022
Transactions on Cryptographic Hardware and Embedded Systems
We show that our technique is particularly efficient for masking structured LWE encryption schemes such as Kyber and Saber. ...
Masking is the main countermeasure against side-channel attacks on embedded devices. ...
Application to ring-LWE IND-CPA decryption In this section we show how to efficiently mask the IND-CPA decryption of ring-LWE schemes. ...
doi:10.46586/tches.v2022.i2.1-40
fatcat:55fvr47bzvaitccbslepzgbodq
Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors
[chapter]
2018
Lecture Notes in Computer Science
Compact implementations of the ring variant of the Learning with Errors (Ring-LWE) on the embedded processors have been actively studied due to potential quantum threats. ...
Various Ring-LWE implementation works mainly focused on optimization techniques to reduce the execution timing and memory consumptions for high availability. ...
In Ring-LWE problem, elements a, s and t are polynomials in the ring R q . Ring-LWE encryption scheme proposed by Lyubashevshy et al. was later optimized in [20] . Roy et al.' ...
doi:10.1007/978-3-319-78556-1_10
fatcat:sqzb33a3grfmnf7mxt6zcyovfu
On-sky verification of Fast and Furious focal-plane wavefront sensing: Moving forward toward controlling the island effect at Subaru/SCExAO
[article]
2020
arXiv
pre-print
This is referred to as the low-wind effect (LWE). The LWE severely distorts the point spread function (PSF), significantly lowering the Strehl ratio and degrading the contrast. ...
The performance of the algorithm was evaluated by two metrics based on the PSF quality: 1) the Strehl ratio approximation (SRA), and 2) variance of the normalized first Airy ring (VAR). ...
The first Airy ring was broken up into three bright lobes, a typical signature of the LWE. ...
arXiv:2005.12097v1
fatcat:3vkwj2xm7ne5jm76wd4542epfi
Low Wind Effect on VLT/SPHERE : impact, mitigation strategy, and results
2018
arXiv
pre-print
Vievard for providing information on the LWE and spiders properties on Gemini South, Magellan, Keck and Subaru telescopes respectively. He thanks P. ...
Figueira for interesting discussion on statistical estimators of the LWE occurence rate. Last but not least, he thanks J. Smoker for his careful english language editing. ...
Figure 5 . 5 Top: Phase maps captured with the Zernike phase mask during the LWE night of October 8 2014 at three different telescope pointings. ...
arXiv:1806.05370v3
fatcat:pldinhnyzjci3kuk3kzctflq3m
Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project
[chapter]
2017
Lecture Notes in Computer Science
We review two protocols for quantum-resistant key exchange based on lattice problems: BCNS15, based on the ring learning with errors problem, and Frodo, based on the learning with errors problem. ...
Acknowledgements Research on LWE and ring-LWE based key exchange discussed in this paper includes joint work with Joppe W. ...
is the decision ring-LWE problem. ...
doi:10.1007/978-3-319-69453-5_2
fatcat:lhen3goh6rb4nft6ui6p4gjuoa
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber
2021
Transactions on Cryptographic Hardware and Embedded Systems
First, we present a method for crafting ring/module-LWE ciphertexts that result in sparse polynomials at the input of inverse NTT computations, independent of the used private key. ...
The effectiveness of our attack is shown on the use-case of CCA2 secure Kyber k-module-LWE, where k ∈ {2, 3, 4}. ...
Therefore, we consider a masked implementation that follows the generic ring-LWE masking strategy from [RRdC + 16, OSPG18], which is also summarized in Section 2.4. ...
doi:10.46586/tches.v2021.i4.88-113
fatcat:4iq6qpbalbbvbdtff47k3dv4sm
Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor
2018
Security and Communication Networks
[22] proposed practical CCA2secure and masking Ring-LWE implementation in an ARM Cortex-M4F environment. They implemented masked PRNG (SHAKE-128) for a countermeasure of a side-channel attack. ...
However, RLizard.CCA and RLizard.KEM have four types of parameter sets: RING CATEGORY1, RING CATEGORY3 N1024, RING CATEGORY3 N2048, and RING CATEGORY5. ...
doi:10.1155/2018/7012056
fatcat:a5aapx5yvjh5tl6f6vrnrn4iem
« Previous
Showing results 1 — 15 out of 345 results