Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…In this work, the proposals [11], [12] for using RNS to enhance the decryption procedure of GGH-like cryptosystems were considered and concretized. They were applied not only to GPU accelerators, but also to CPU devices.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this work, the proposals [11], [12] for using RNS to enhance the decryption procedure of GGH-like cryptosystems were considered and concretized. They were applied not only to GPU accelerators, but also to CPU devices.…”
Section: Discussionmentioning
confidence: 99%
“…In their first form, GGH signature and encryption schemes were severely broken [4], [5] and thwarting these attacks is still a current concern [6]- [8]. Recently, GGH has got many improvements [9]- [11] to make it competitive under secure parameters. This article deals with efficient implementation of GGH decryption function, via an arithmetical approach as suggested in [12].…”
Section: Introductionmentioning
confidence: 99%
“…Since Shor's discovery of the quantum factoring algorithm in the mid-1990s attempts to solve lattice problems by quantum algorithms have been made. With the continuous advancements in the field of quantum computing, the security of many existing asymmetric key cryptosystems has been demonstrated to be broken in the theoretical sense [7].…”
Section: Relationship Of Qc and Latticementioning
confidence: 99%
“…Originally proposed with size of parameters making it viable in practice, encryption and signature GGH schemes, however, contained major flaws [19,20], forcing the lattice dimensions to be greater than suggested, essentially in order to put attacks based on lattice reduction out of action. Thus, many consecutive works were concerned by as well thwarting these attacks [17,32] as bringing practical improvements [18,22,27] to make such scheme viable under safe parameters.…”
mentioning
confidence: 99%