搜索结果: 1-6 共查到“军队指挥学 Discrete Gaussian sampling”相关记录6条 . 查询时间(0.078 秒)
Compact and Scalable Arbitrary-centered Discrete Gaussian Sampling over Integers
Lattice-based crypto discrete Gaussian sampling implementation
2019/9/16
The arbitrary-centered discrete Gaussian sampler is a fundamental subroutine in implementing lattice trapdoor sampling algorithms. However, existing approaches typically rely on either a fast implemen...
Polar Sampler: Discrete Gaussian Sampling over the Integers Using Polar Codes
Discrete Gaussian sampling Polar codes Integer lattice
2019/6/10
Cryptographic constructions based on hard lattice problems have emerged as a front runner for the standardization of post quantum public key cryptography. As the standardization process takes place, o...
Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on Falcon
Post-quantum signature Falcon constant-time
2019/3/6
Sampling from discrete Gaussian distribution has applications in lattice-based post-quantum cryptography. Several efficient solutions have been proposed in recent years. However, making a Gaussian sam...
Error Estimation of Practical Convolution Discrete Gaussian Sampling
Discrete Gaussian Sampling convolution theorem lattice
2018/4/4
Discrete Gaussian Sampling is a fundamental tool in lattice cryptography which has been used in digital signatures, identify-based encryption, attribute-based encryption, zero-knowledge proof and full...
An Investigation of Sources of Randomness Within Discrete Gaussian Sampling
Lattice-based cryptography Discrete Gaussian sampling randomness
2017/4/11
This paper presents a performance and statistical analysis of random number generators and discrete Gaussian samplers implemented in software. Most Lattice-based cryptographic schemes utilise discrete...
Compact and Side Channel Secure Discrete Gaussian Sampling
Lattice-based cryptography Discrete Gaussian Sampler Hardware implementation
2016/1/8
Discrete Gaussian sampling is an integral part of many lattice based cryptosystems such as public-key encryption, digital signature schemes and homomorphic encryption schemes. In this paper we propose...