2015
DOI: 10.1145/2700078
|View full text |Cite
|
Sign up to set email alerts
|

On Constrained Implementation of Lattice-Based Cryptographic Primitives and Schemes on Smart Cards

Abstract: Abstract. Most lattice-based cryptographic schemes with a security proof suffer from large key sizes and heavy computations. This is also true for the simpler case of authentication protocols which are used on smart cards, as a very-constrained computing environment. Recent progress on ideal lattices has significantly improved the efficiency, and made it possible to implement practical lattice-based cryptography on constrained devices. However, to the best of our knowledge, no previous attempts were made to im… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
56
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 39 publications
(57 citation statements)
references
References 29 publications
1
56
0
Order By: Relevance
“…In Chapter 5 we discuss decryption errors and two hardware designs optimized for performance and area, respectively. Implementations of RLWEenc on the 8-bit ATxmega and ATmega family of microcontrollers have been proposed in [BSJ14,BJ14] and an implementation on a Cortex-M4F device is given in [dCRVV15] …”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…In Chapter 5 we discuss decryption errors and two hardware designs optimized for performance and area, respectively. Implementations of RLWEenc on the 8-bit ATxmega and ATmega family of microcontrollers have been proposed in [BSJ14,BJ14] and an implementation on a Cortex-M4F device is given in [dCRVV15] …”
Section: Related Workmentioning
confidence: 99%
“…However, a straightforward implementation using the C %-operator with a constant modulus is quite expensive and requires around 600 cycles in our own experiments due to the generic libc modular reduction (call __udivmodsi4). As a consequence, the software of the authors of [BSJ14] still consumes approx. Another approach is a subtract-and-shift algorithm which loads the shifted modulus as constant and the input into a temporary register.…”
Section: Combination Of Optimization Techniquesmentioning
confidence: 99%
See 3 more Smart Citations