Lattice-Based Public-Key Cryptography in Hardware


Book Description

This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module.




Cryptographic Hardware and Embedded Systems -- CHES 2012


Book Description

This book constitutes the proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2012, held in Leuven, Belgium, in September 2012. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 120 submissions. The papers are organized in the following topical sections: intrusive attacks and countermeasures; masking; improved fault attacks and side channel analysis; leakage resiliency and security analysis; physically unclonable functions; efficient implementations; lightweight cryptography; we still love RSA; and hardware implementations.




Lattice-Based Cryptosystems


Book Description

This book focuses on lattice-based cryptosystems, widely considered to be one of the most promising post-quantum cryptosystems and provides fundamental insights into how to construct provably secure cryptosystems from hard lattice problems. The concept of provable security is used to inform the choice of lattice tool for designing cryptosystems, including public-key encryption, identity-based encryption, attribute-based encryption, key change and digital signatures. Given its depth of coverage, the book especially appeals to graduate students and young researchers who plan to enter this research area.




A Decade of Lattice Cryptography


Book Description

Surveys most of the major developments in lattice cryptography over the past ten years. The main focus is on the foundational short integer solution (SIS) and learning with errors (LWE) problems, their provable hardness assuming the worst-case intractability of standard lattice problems, and their many cryptographic applications.




Lattices and their application in Cryptography


Book Description

Bachelor Thesis from the year 2014 in the subject Engineering - Computer Engineering, grade: 1,0, Hamburg University of Technology (Institut für Eingebettete Systeme), language: English, abstract: The aim of this thesis is to identify the characteristics of lattice-based cryptosystems. The use of encryption and signature schemes can be insecure considering attacks by a quantum computer and inefficient in the computation time. An alternative cryptography is proposed, which is based on worst-case lattice problems. The security and the hardness of the underlying computational problems will be analyzed by providing collaboration between the linear-algebra, complexity-theory and the public-key cryptography.




Public-Key Cryptography – PKC 2018


Book Description

The two-volume set LNCS 10769 and 10770 constitutes the refereed proceedings of the 21st IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2018, held in Rio de Janeiro, Brazil, in March 2018. The 49 revised papers presented were carefully reviewed and selected from 186 submissions. They are organized in topical sections such as Key-Dependent-Message and Selective-Opening Security; Searchable and Fully Homomorphic Encryption; Public-Key Encryption; Encryption with Bad Randomness; Subversion Resistance; Cryptanalysis; Composable Security; Oblivious Transfer; Multiparty Computation; Signatures; Structure-Preserving Signatures; Functional Encryption; Foundations; Obfuscation-Based Cryptographic Constructions; Protocols; Blockchain; Zero-Knowledge; Lattices.




Cryptographic Hardware and Embedded Systems -- CHES 2015


Book Description

This book constitutes the refereed proceedings of the 17th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, held in Saint Malo, France, in September 2015. The 34 full papers included in this volume were carefully reviewed and selected from 128 submissions. They are organized in the following topical sections: processing techniques in side-channel analysis; cryptographic hardware implementations; homomorphic encryption in hardware; side-channel attacks on public key cryptography; cipher design and cryptanalysis; true random number generators and entropy estimations; side-channel analysis and fault injection attacks; higher-order side-channel attacks; physically unclonable functions and hardware trojans; side-channel attacks in practice; and lattice-based implementations.




Mathematics of Public Key Cryptography


Book Description

This advanced graduate textbook gives an authoritative and insightful description of the major ideas and techniques of public key cryptography.




Lattice-Based Cryptography


Book Description

Lattice-based cryptography is a promising post-quantum cryptographic approach that can withstand potential attacks from future quantum computers. This book will introduce the theoretical mathematics that underpins lattice-based cryptography, such as the hard problems based on lattices upon which the security of lattice-based cryptosystems rely. It will provide examples of how these hard problems can be used to build basic lattice-based cryptographic primitives, namely encryption, digital signatures and key exchange, in addition to more advanced primitives such as identity-based encryption (IBE), attribute-based encryption (ABE) and hierarchical identity-based encryption (HIBE). Subsequently, the practical aspects of designing efficient and robust lattice-based cryptosystems in both hardware and software will be detailed. The resilience of lattice-based implementations to physical attacks will be discussed in addition to appropriate countermeasures that can be integrated into implementations to defend against such attacks. Finally, three case studies will be described to illustrate how lattice-based cryptography can be successfully embedded into real-world scenarios.




Cryptographic Engineering


Book Description

This book is for engineers and researchers working in the embedded hardware industry. This book addresses the design aspects of cryptographic hardware and embedded software. The authors provide tutorial-type material for professional engineers and computer information specialists.