2014 International Symposium on Integrated Circuits (ISIC) 2014
DOI: 10.1109/isicir.2014.7029534
|View full text |Cite
|
Sign up to set email alerts
|

Babaï round-off CVP method in RNS: Application to lattice based cryptographic protocols

Abstract: Lattice based cryptography is claimed as a serious candidate for post quantum cryptography, it recently became an essential tool of modern cryptography. Nevertheless, if lattice based cryptography has made theoretical progresses, its chances to be adopted in practice are still low due to the cost of the computation. If some approaches like RSA and ECC have been strongly optimized-in particular their core arithmetic operations, the modular multiplication and/or the modular exponentiation-lattice based cryptogra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
2
2
2

Relationship

4
2

Authors

Journals

citations
Cited by 7 publications
(15 citation statements)
references
References 24 publications
(18 reference statements)
0
15
0
Order By: Relevance
“…no multiple of M 0 should appear in the residues of the output in base M), the base M 0 has to be large enough to completely represent the result. In further parts, different approaches and their consequences will be discussed [4,5].…”
Section: Adapting Babai's Rounding-off Algorithm To Rnsmentioning
confidence: 99%
See 2 more Smart Citations
“…no multiple of M 0 should appear in the residues of the output in base M), the base M 0 has to be large enough to completely represent the result. In further parts, different approaches and their consequences will be discussed [4,5].…”
Section: Adapting Babai's Rounding-off Algorithm To Rnsmentioning
confidence: 99%
“…The approach depicted in this part was first described in [4]. The performances of implementations on CPU or GPU have been investigated in [16].…”
Section: Mrs Approach For Bex Meth1mentioning
confidence: 99%
See 1 more Smart Citation
“…[10,32]) and very recently lattice based cryptography (e.g. [5]). In this paper, we only deal with hardware implementations of ECC.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, GGH has got many improvements [9]- [11] to make it competitive under secure parameters. This article deals with efficient implementation of GGH decryption function, via an arithmetical approach as suggested in [12].…”
Section: Introductionmentioning
confidence: 99%