Search for dissertations about: "lattice encryption"

Found 4 swedish dissertations containing the words lattice encryption.

  1. 1. Some Notes on Post-Quantum Cryptanalysis

    Author : Erik Mårtensson; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Cryptography; Post-quantum cryptography; LWE; BKW; Cryptanalysis; Lattice sieving; SVP; Lattice-based cryptography; Code-based cryptography;

    Abstract : Cryptography as it is used today relies on a foundational level on the assumptionthat either the Integer Factoring Problem (IFP) or the DiscreteLogarithm Problem (DLP) is computationally intractable. In the 1990s PeterShor developed a quantum algorithm that solves both problems in polynomialtime. READ MORE

  2. 2. Decryption Failure Attacks on Post-Quantum Cryptography

    Author : Alexander Nilsson; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Post-quantum cryptography; Code-based cryptography; Lattice-based cryptography; side-channel attack;

    Abstract : This dissertation discusses mainly new cryptanalytical results related to issues of securely implementing the next generation of asymmetric cryptography, or Public-Key Cryptography (PKC).PKC, as it has been deployed until today, depends heavily on the integer factorization and the discrete logarithm problems. READ MORE

  3. 3. Using Coding Techniques for Attacking Post-Quantum Cryptographic Assumptions and Systems

    Author : Qian Guo; Institutionen för elektro- och informationsteknik; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY;

    Abstract : Post-quantum cryptography for resisting possible attacks from malicious quantum adversaries has become one of the key topics in recent cryptographic research. Its ultimate goal is to search for efficient and secure primitives replacing the factoring- and discrete log-based schemes in service that will be broken in polynomial time by Shor’s algorithm. READ MORE

  4. 4. Defense of Cyber-Physical Systems Against Learning-based Attackers

    Author : Rijad Alisic; Henrik Sandberg; Karl H. Johansson; Miroslav Pajic; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Control Theory; Security; Privacy; Machine Learning; Cyber-Physical Systems; Change Point Problems; Electrical Engineering; Elektro- och systemteknik;

    Abstract : Cyberattacks against critical infrastructures pose a serious threat to society, as they can have devastating consequences on the economy, security, or public health. These infrastructures rely on a large network of cyber components, such as sensors, controllers, computers, and communication devices, to monitor and control their physical processes. READ MORE