Efficient software implementation of ring-LWE encryption
- Submitting institution
-
The University of Birmingham
- Unit of assessment
- 11 - Computer Science and Informatics
- Output identifier
- 91113680
- Type
- E - Conference contribution
- DOI
-
10.7873/DATE.2015.0378
- Title of conference / published proceedings
- Proceedings of the 2015 Design, Automation and Test in Europe Conference and Exhibition, DATE 2015
- First page
- 339
- Volume
- -
- Issue
- -
- ISSN
- 1530-1591
- Open access status
- Out of scope for open access requirements
- Month of publication
- April
- Year of publication
- 2015
- URL
-
-
- Supplementary information
-
-
- Request cross-referral to
- -
- Output has been delayed by COVID-19
- No
- COVID-19 affected output statement
- -
- Forensic science
- No
- Criminology
- No
- Interdisciplinary
- No
- Number of additional authors
-
3
- Research group(s)
-
-
- Citation count
- 31
- Proposed double-weighted
- No
- Reserve for an output with double weighting
- No
- Additional information
- Adding security to computationally constrained devices remains a challenging problem. Our present-day public-key algorithms will become insecure when quantum computers become a reality. Lattice problems have been used to construct post-quantum cryptographic algorithms. The paper pioneered the method of adding lattice-based cryptography (computationally expensive) to constrained microcontrollers that are deployed in millions of IoT devices. The work increased confidence in lattice-based cryptography for IoT applications. The optimization algorithms have been used and subsequently improved in several follow-on projects including cryptographic libraries. In the ongoing NIST post-quantum cryptography standardization project, all lattice-based candidates provide optimized implementations targeting such constrained microcontrollers.
- Author contribution statement
- -
- Non-English
- No
- English abstract
- -