Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ideal lattice
biblio
An Anti-Quantum Signature Scheme over Ideal Lattice in Blockchain
Submitted by aekwall on Mon, 11/29/2021 - 2:29pm
security
blockchain
Resists
encryption
pubcrawl
composability
Elliptic curve cryptography
standards
Compositionality
anti-quantum
bonsai trees
gaussian distribution
ideal lattice
Lattices
theoretical cryptography
biblio
Hardware Design of Polynomial Multiplication for Byte-Level Ring-LWE Based Cryptosystem
Submitted by aekwall on Mon, 03/15/2021 - 12:10pm
NIST PQC Standardization Process
BRAMs
byte-level modulus
byte-level ring-LWE based cryptosystem
computational time-consuming block
DSPs
high-level synthesis based hardware design methodology
ideal lattice
LAC
multiplication core
high level synthesis
polynomial multiplication
ring learning with error problem
ring LWE
time 4.3985 ns
time 5.052 ns
time 5.133 ns
Vivado HLS compiler
Xilinx Artix-7 family FPGA
NIST
Scalability
lattice-based cryptography
Cryptography
Hardware
Table lookup
learning (artificial intelligence)
Resiliency
pubcrawl
Metrics
field programmable gate arrays
post quantum cryptography
timing
polynomials
Software algorithms
Compositionality
program compilers
compiler security
logic design
biblio
Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices
Submitted by grigby1 on Fri, 07/24/2020 - 12:51pm
multiauthority CP-ABE scheme
cryptographic applications
cryptographic technology
data confidentiality
flexible threshold access policy
generic lattice
ideal lattice
Multi-authority
multiauthority ciphertext policy
Ciphertext policy attribute-based encryption
multiple attribute authorities
post-quantum era
quantum attacks
R-LWE
ring learning with errors
virtual attributes
collaboration
Cryptography
bilinear maps
fine-grained access control
Resists
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
encryption scheme
CP-ABE
Lattices
policy-based governance
pubcrawl
Cloud Computing
Scalability
data privacy
authorisation
Access Control
encryption