Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card platform
Abstract The lattice‐based encryption scheme has high efficiency and reliability, and it can be run on small devices with limited memory capacity and computational resources such as sensor nodes or smart cards. The first implementation is presented of the original ring–learning‐with‐errors‐based enc...
Saved in:
| Main Authors: | Ye Yuan, Kazuhide Fukushima, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2021-07-01
|
| Series: | IET Information Security |
| Subjects: | |
| Online Access: | https://doi.org/10.1049/ise2.12012 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Java Card Approach to Emulate The Indonesian National Electronic ID Smart Cards
by: Dwidharma Priyasta, et al.
Published: (2018-11-01) -
Research on Java card security
by: Xue-lian ZHANG, et al.
Published: (2017-06-01) -
Towards an efficient LWE‐based fully homomorphic encryption scheme
by: Uddipana Dowerah, et al.
Published: (2022-07-01) -
A novel scheme for lossless authenticated multiple secret images sharing using polynomials and extended visual cryptography
by: Krishnaraj Bhat, et al.
Published: (2021-01-01) -
Trusted access scheme for intranet mobile terminal based on encrypted SD card
by: Jiyang LI, et al.
Published: (2019-08-01)