Comparative Analysis of Elliptic Curve and Lattice Based Cryptography

A. Davenport, S. Shetty
{"title":"Comparative Analysis of Elliptic Curve and Lattice Based Cryptography","authors":"A. Davenport, S. Shetty","doi":"10.23919/ANNSIM52504.2021.9552144","DOIUrl":null,"url":null,"abstract":"In this paper, we provide a mathematical background and analysis of Lattice Based Cryptography for the less mathematically mature reader. Discussing the benefits and constraints of Lattice Based Crypto, we compare and contrast with Elliptic Curve Cryptography to provide an understanding of what the limitations of Lattice Based Cryptography are, and what needs to be achieved for the quantum resistant protocols to be deploy-able to any and all devices.","PeriodicalId":6782,"journal":{"name":"2021 Annual Modeling and Simulation Conference (ANNSIM)","volume":"37 1","pages":"1-9"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Annual Modeling and Simulation Conference (ANNSIM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/ANNSIM52504.2021.9552144","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

In this paper, we provide a mathematical background and analysis of Lattice Based Cryptography for the less mathematically mature reader. Discussing the benefits and constraints of Lattice Based Crypto, we compare and contrast with Elliptic Curve Cryptography to provide an understanding of what the limitations of Lattice Based Cryptography are, and what needs to be achieved for the quantum resistant protocols to be deploy-able to any and all devices.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
椭圆曲线与点阵密码的比较分析
在本文中,我们为数学上不太成熟的读者提供了基于点阵密码学的数学背景和分析。讨论了基于点阵加密的优点和限制,我们与椭圆曲线加密进行了比较和对比,以了解基于点阵加密的局限性是什么,以及量子抵抗协议需要实现什么才能部署到任何和所有设备。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Tutorial Introduction to Colored Petri Nets Framework for Model-Driven System Design and Engineering Decision of Learning Status Based on Modeling of the Information Measurement of Social Behavioral Tasks in Rhesus Monkeys Towards a Universal Representation of DEVS: A Metamodel-Based Definition of DEVS Formal Specification Evaluating Azure Kinect and Structure Mark-II 3D Surface Scanners for Clinical Chest Wall Deformity Assessment Automatically Combining Conceptual Models Using Semantic and Structural Information
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1