Journal articles on the topic 'Lattice based encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Lattice based encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kadykov, Victor, Alla Levina, and Alexander Voznesensky. "Homomorphic Encryption within Lattice-Based Encryption System." Procedia Computer Science 186 (2021): 309–15. http://dx.doi.org/10.1016/j.procs.2021.04.149.
Full textBandara, Harshana, Yasitha Herath, Thushara Weerasundara, and Janaka Alawatugoda. "On Advances of Lattice-Based Cryptographic Schemes and Their Implementations." Cryptography 6, no. 4 (November 9, 2022): 56. http://dx.doi.org/10.3390/cryptography6040056.
Full textJiang, Mingming, Yupu Hu, Hao Lei, Baocang Wang, and Qiqi Lai. "Lattice-based certificateless encryption scheme." Frontiers of Computer Science 8, no. 5 (July 31, 2014): 828–36. http://dx.doi.org/10.1007/s11704-014-3187-6.
Full textZeng, Fugeng, and Chunxiang Xu. "A Novel Model for Lattice-Based Authorized Searchable Encryption with Special Keyword." Mathematical Problems in Engineering 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/314621.
Full textKumar, Vishnu. "Text Encryption using Lattice-Based Cryptography." IOSR Journal of Computer Engineering 16, no. 2 (2014): 148–51. http://dx.doi.org/10.9790/0661-1628148151.
Full textLi, Zengpeng, Can Xiang, and Chengyu Wang. "Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography." Wireless Communications and Mobile Computing 2018 (September 2, 2018): 1–11. http://dx.doi.org/10.1155/2018/5973285.
Full textCheng, Rong, and Fangguo Zhang. "Lattice-based obfuscation for re-encryption functions." Security and Communication Networks 8, no. 9 (October 20, 2014): 1648–58. http://dx.doi.org/10.1002/sec.1112.
Full textKadykov, V. Yu, and A. B. Levina. "HOMOMORPHIC OPERATIONS WITHIN IDEAL LATTICE BASED ENCRYPTION SYSTEMS." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 198 (December 2020): 40–46. http://dx.doi.org/10.14489/vkit.2020.12.pp.040-046.
Full textCisneros, Mauricio, and Javier Olazabal. "Lattice-Based Cryptography in the Quantum Era: A Survey." Interfases, no. 018 (December 29, 2023): 281–99. http://dx.doi.org/10.26439/interfases2023.n018.6631.
Full textFu, Xingbing, Yong Ding, Haifeng Li, Jianting Ning, Ting Wu, and Fagen Li. "A survey of lattice based expressive attribute based encryption." Computer Science Review 43 (February 2022): 100438. http://dx.doi.org/10.1016/j.cosrev.2021.100438.
Full textRenteria-Mejia, Claudia P., and Jaime Velasco-Medina. "Lattice-Based Cryptoprocessor for CCA-Secure Identity-Based Encryption." IEEE Transactions on Circuits and Systems I: Regular Papers 67, no. 7 (July 2020): 2331–44. http://dx.doi.org/10.1109/tcsi.2020.2981089.
Full textZhang, Guo Yan. "Fuzzy Certificateless Identity-Based Encryption Protocol from Lattice." Applied Mechanics and Materials 380-384 (August 2013): 2262–66. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2262.
Full textB M, Chandrakala, and S. C. Lingareddy. "Proxy Re-Encryption in cloud using ALBC (adaptive lattice based cryptography)." Indonesian Journal of Electrical Engineering and Computer Science 16, no. 3 (December 1, 2019): 1455. http://dx.doi.org/10.11591/ijeecs.v16.i3.pp1455-1463.
Full textMa, Chunguang, Juyan Li, and Weiping Ouyang. "Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 645–60. http://dx.doi.org/10.1142/s0129054117400111.
Full textYe, Qing, Qiaojia Zhang, Sijie Liu, and Kaiqiang Chen. "A novel chaotic system based on coupled map lattice and its application in HEVC encryption." Mathematical Biosciences and Engineering 18, no. 6 (2021): 9410–29. http://dx.doi.org/10.3934/mbe.2021463.
Full textROZLOMII, Inna. "METHOD OF CONSTRUCTION MATRIX CARDANO’S GRIDS FOR COMPRESSION OF INFORMATION." Herald of Khmelnytskyi National University 305, no. 1 (February 23, 2022): 84–89. http://dx.doi.org/10.31891/2307-5732-2022-305-1-84-89.
Full textJiang, M. M., Y. P. Hu, B. C. Wang, F. H. Wang, and Q. Q. Lai. "Lattice-based multi-use unidirectional proxy re-encryption." Security and Communication Networks 8, no. 18 (June 29, 2015): 3796–803. http://dx.doi.org/10.1002/sec.1300.
Full textSabani, Maria E., Ilias K. Savvas, Dimitrios Poulakis, Georgia Garani, and Georgios C. Makris. "Evaluation and Comparison of Lattice-Based Cryptosystems for a Secure Quantum Computing Era." Electronics 12, no. 12 (June 12, 2023): 2643. http://dx.doi.org/10.3390/electronics12122643.
Full textLi, Juyan, Zhiqi Qiao, Kejia Zhang, and Chen Cui. "A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing." Sensors 21, no. 1 (January 4, 2021): 288. http://dx.doi.org/10.3390/s21010288.
Full textLiu, Yuan, Licheng Wang, Xiaoying Shen, and Lixiang Li. "New Constructions of Identity-Based Dual Receiver Encryption from Lattices." Entropy 22, no. 6 (May 28, 2020): 599. http://dx.doi.org/10.3390/e22060599.
Full textSingh, Kunwar, C. Pandu Rangan, and A. K. Banerjee. "Lattice-based identity-based resplittable threshold public key encryption scheme." International Journal of Computer Mathematics 93, no. 2 (June 27, 2014): 289–307. http://dx.doi.org/10.1080/00207160.2014.928286.
Full textGonzález de la Torre, Miguel Ángel, Luis Hernández Encinas, and Araceli Queiruga-Dios. "Analysis of the FO Transformation in the Lattice-Based Post-Quantum Algorithms." Mathematics 10, no. 16 (August 17, 2022): 2967. http://dx.doi.org/10.3390/math10162967.
Full textDong, Xingting, Yanhua Zhang, Baocang Wang, and Jiangshan Chen. "Server-Aided Revocable Attribute-Based Encryption from Lattices." Security and Communication Networks 2020 (February 12, 2020): 1–13. http://dx.doi.org/10.1155/2020/1460531.
Full textWANG, FENGHE, XU AN WANG, and CHUNXIAO WANG. "Lattice-based Dynamical and Anonymous Broadcast Encryption Scheme for Wireless Ad Hoc Networks." Journal of Interconnection Networks 15, no. 03n04 (September 2015): 1540005. http://dx.doi.org/10.1142/s0219265915400058.
Full textLing, San, Khoa Nguyen, Huaxiong Wang, and Juanyang Zhang. "Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation." Computer Journal 62, no. 12 (November 18, 2019): 1849–62. http://dx.doi.org/10.1093/comjnl/bxz079.
Full textZhang, Xiaojun, Chunxiang Xu, Liming Mu, and Jie Zhao. "Identity-based encryption with keyword search from lattice assumption." China Communications 15, no. 4 (April 2018): 164–78. http://dx.doi.org/10.1109/cc.2018.8357694.
Full textYao, Yanqing, Zhengde Zhai, Jianwei Liu, and Zhoujun Li. "Lattice-Based Key-Aggregate (Searchable) Encryption in Cloud Storage." IEEE Access 7 (2019): 164544–55. http://dx.doi.org/10.1109/access.2019.2952163.
Full textSolé, P., C. Charnes, and B. Martin. "A lattice-based McEliece scheme for encryption and signature." Electronic Notes in Discrete Mathematics 6 (April 2001): 402–11. http://dx.doi.org/10.1016/s1571-0653(04)00192-1.
Full textBehnia, Rouzbeh, Muslum Ozgur Ozmen, and Attila Altay Yavuz. "Lattice-Based Public Key Searchable Encryption from Experimental Perspectives." IEEE Transactions on Dependable and Secure Computing 17, no. 6 (November 1, 2020): 1269–82. http://dx.doi.org/10.1109/tdsc.2018.2867462.
Full textLv, Xiupin, Xiaofeng Liao, and Bo Yang. "Bit-level plane image encryption based on coupled map lattice with time-varying delay." Modern Physics Letters B 32, no. 10 (April 10, 2018): 1850124. http://dx.doi.org/10.1142/s0217984918501245.
Full textDel Rey, A. Martín, and G. Rodríguez Sánchez. "An image encryption algorithm based on 3D cellular automata and chaotic maps." International Journal of Modern Physics C 26, no. 01 (January 2015): 1450069. http://dx.doi.org/10.1142/s0129183114500697.
Full textAbusham, Eimad, Basil Ibrahim, Kashif Zia, and Sanad Al Maskari. "An Integration of New Digital Image Scrambling Technique on PCA-Based Face Recognition System." Scientific Programming 2022 (November 25, 2022): 1–17. http://dx.doi.org/10.1155/2022/2628885.
Full textLuo, Fucai, and Saif Al-Kuwari. "Revocable attribute-based proxy re-encryption." Journal of Mathematical Cryptology 15, no. 1 (January 1, 2021): 465–82. http://dx.doi.org/10.1515/jmc-2020-0039.
Full textChen, Qihong, Mingming Jiang, Yuyan Guo, Dongbing Zhang, Weina Jia, and Wen Zheng. "Efficient Multibit Function Encryption for Data Security in Internet of Things." Security and Communication Networks 2022 (April 14, 2022): 1–10. http://dx.doi.org/10.1155/2022/3227712.
Full textChillali, Abdelhakim, Mohammed Elhassani, and Ali Mouhib. "Cryptosystem based on lattice and elliptic curve." Gulf Journal of Mathematics 8, no. 2 (August 17, 2020): 27–34. http://dx.doi.org/10.56947/gjom.v8i2.362.
Full textHe, Hong, Hong Dong, Tong Yang, Lin He, and Yi Wu. "A Design of a Method of Chaos-Based Secure Communication." Advanced Materials Research 204-210 (February 2011): 508–11. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.508.
Full textYan, Jianhua, Licheng Wang, Lihua Wang, Yixian Yang, and Wenbin Yao. "Efficient Lattice-Based Signcryption in Standard Model." Mathematical Problems in Engineering 2013 (2013): 1–18. http://dx.doi.org/10.1155/2013/702539.
Full textWANG, XING-YUAN, and TIAN WANG. "A NOVEL ALGORITHM FOR IMAGE ENCRYPTION BASED ON COUPLE CHAOTIC SYSTEMS." International Journal of Modern Physics B 26, no. 30 (October 7, 2012): 1250175. http://dx.doi.org/10.1142/s0217979212501755.
Full textYu, Xiaoling, Chungen Xu, Lei Xu, and Yuntao Wang. "Lattice-Based Searchable Encryption Scheme Against Inside Keywords Guessing Attack." Computers, Materials & Continua 64, no. 2 (2020): 1107–25. http://dx.doi.org/10.32604/cmc.2020.09680.
Full textSepahi, Reza, Ron Steinfeld, and Josef Pieprzyk. "Lattice-based certificateless public-key encryption in the standard model." International Journal of Information Security 13, no. 4 (December 10, 2013): 315–33. http://dx.doi.org/10.1007/s10207-013-0215-8.
Full textHe, Kai, Xueqiao Liu, Jia-Nan Liu, and Wei Liu. "Efficient Identity-Based Broadcast Encryption Scheme on Lattices for the Internet of Things." Security and Communication Networks 2021 (December 13, 2021): 1–11. http://dx.doi.org/10.1155/2021/2847731.
Full textMukherjee, Anisha, Aikata Aikata, Ahmet Can Mert, Yongwoo Lee, Sunmin Kwon, Maxim Deryabin, and Sujoy Sinha Roy. "ModHE: Modular Homomorphic Encryption Using Module Lattices." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 1 (December 4, 2023): 527–62. http://dx.doi.org/10.46586/tches.v2024.i1.527-562.
Full textYan, Jianhua, Xiuhua Lu, Muzi Li, Licheng Wang, Jingxian Zhou, and Wenbin Yao. "Practical NTRU Signcryption in the Standard Model." Entropy 25, no. 12 (December 13, 2023): 1651. http://dx.doi.org/10.3390/e25121651.
Full textXingyuan, Wang, Gao Suo, Ye Xiaolin, Zhou Shuang, and Wang Mingxu. "A New Image Encryption Algorithm with Cantor Diagonal Scrambling Based on the PUMCML System." International Journal of Bifurcation and Chaos 31, no. 01 (January 2021): 2150003. http://dx.doi.org/10.1142/s0218127421500036.
Full textYang, Nan, and Youliang Tian. "Identity-Based Unidirectional Collusion-Resistant Proxy Re-Encryption from U-LWE." Security and Communication Networks 2023 (January 3, 2023): 1–9. http://dx.doi.org/10.1155/2023/3765934.
Full textLi, Juyan, Chunguang Ma, and Kejia Zhang. "A Novel Lattice-Based CP-ABPRE Scheme for Cloud Sharing." Symmetry 11, no. 10 (October 9, 2019): 1262. http://dx.doi.org/10.3390/sym11101262.
Full textLiu, Yuan, Licheng Wang, Xiaoying Shen, Lixiang Li, and Dezhi An. "Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes." Security and Communication Networks 2020 (August 7, 2020): 1–11. http://dx.doi.org/10.1155/2020/2345369.
Full textB M, Chandrakala, and S. C. Linga Reddy. "Secure and Efficient Bi-Directional Proxy Re-Encyrption Technique." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 3 (December 1, 2018): 1143. http://dx.doi.org/10.11591/ijeecs.v12.i3.pp1143-1150.
Full textLin, Hui, Dongsheng Liu, Cong Zhang, and Yahui Dong. "Design and Implementation of a Lattice-Based Public-Key Encryption Scheme." Journal of Circuits, Systems and Computers 27, no. 13 (August 3, 2018): 1850201. http://dx.doi.org/10.1142/s0218126618502018.
Full textDutta, Priyanka, Willy Susilo, Dung Hoang Duong, and Partha Sarathi Roy. "Collusion-resistant identity-based Proxy Re-encryption: Lattice-based constructions in Standard Model." Theoretical Computer Science 871 (June 2021): 16–29. http://dx.doi.org/10.1016/j.tcs.2021.04.008.
Full text