Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Post-quantum lattice-based cryptography implementations: A survey
The advent of quantum computing threatens to break many classical cryptographic
schemes, leading to innovations in public key cryptography that focus on post-quantum …
schemes, leading to innovations in public key cryptography that focus on post-quantum …
Benchmarking post-quantum cryptography in TLS
Post-quantum cryptographic primitives have a range of trade-offs compared to traditional
public key algorithms, either having slower computation or larger public keys and …
public key algorithms, either having slower computation or larger public keys and …
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices
Although they have been studied for a long time, distributed signature protocols have
garnered renewed interest in recent years in view of novel applications to topics like …
garnered renewed interest in recent years in view of novel applications to topics like …
A comprehensive survey on post-quantum tls
Transport Layer Security (TLS) is the backbone security protocol of the Internet. As this
fundamental protocol is at risk from future quantum attackers, many proposals have been …
fundamental protocol is at risk from future quantum attackers, many proposals have been …
Efficient lattice-based zero-knowledge arguments with standard soundness: construction and applications
We provide new zero-knowledge argument of knowledge systems that work directly for a
wide class of language, namely, ones involving the satisfiability of matrix-vector relations …
wide class of language, namely, ones involving the satisfiability of matrix-vector relations …
High-order masking of lattice signatures in quasilinear time
In recent years, lattice-based signature schemes have emerged as the most prominent post-
quantum solutions, as illustrated by NIST's selection of Falcon and Dilithium for …
quantum solutions, as illustrated by NIST's selection of Falcon and Dilithium for …
Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial M2M communication
The threat of a cryptographically relevant quantum computer contributes to an increasing
interest in the field of post-quantum cryptography (PQC). Compared to existing research …
interest in the field of post-quantum cryptography (PQC). Compared to existing research …
ModFalcon: Compact signatures based on module-NTRU lattices
Lattices lead to promising practical post-quantum digital signatures, combining asymptotic
efficiency with strong theoretical security guarantees. However, tuning their parameters into …
efficiency with strong theoretical security guarantees. However, tuning their parameters into …
Improving the performance of the picnic signature scheme
D Kales, G Zaverucha - IACR Transactions on Cryptographic …, 2020 - tches.iacr.org
Picnic is a digital signature algorithm designed to provide security against attacks by
quantum computers. The design uses only symmetric-key primitives, and is an efficient …
quantum computers. The design uses only symmetric-key primitives, and is an efficient …
Practical implementation of ring-SIS/LWE based signature and IBE
Lattice-based signature and Identity-Based Encryption are well-known cryptographic
schemes, and having both efficient and provable secure schemes in the standard model is …
schemes, and having both efficient and provable secure schemes in the standard model is …