Constructing the Cryptographic Boundaries for Lattice-based Cryptography on Hardware Security Module.
Junting XiaoTadahiko ItoPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- random number generator
- public key cryptography
- information security
- cryptographic algorithms
- elliptic curve cryptography
- cryptographic protocols
- smart card
- advanced encryption standard
- encryption algorithms
- security protocols
- key management
- security properties
- encryption scheme
- security requirements
- random number
- protection schemes
- hardware and software
- elliptic curve
- public key
- security analysis
- low cost
- security issues
- encryption decryption
- security services
- security mechanisms
- fuzzy vault
- intrusion detection
- authentication scheme
- real time
- host computer
- high security
- provably secure
- trusted computing
- secure communication
- public key encryption
- access control
- encryption algorithm
- security systems
- network security
- secret key
- resource constrained
- data encryption
- computer systems
- cellular automata
- hardware implementation
- biometric data
- security model
- public key infrastructure
- stream cipher
- digital watermark
- authentication protocol
- concept lattice
- digital signature
- encryption key
- privacy preserving
- high assurance
- operating system
- key distribution
- security level