Advertisement

Conclusions and Future Work

  • Sujoy Sinha RoyEmail author
  • Ingrid Verbauwhede
Chapter
Part of the Computer Architecture and Design Methodologies book series (CADM)

Abstract

In this chapter we summarize the contributions of this work and point out some of the possible future directions.

References

  1. 1.
    Alkim E, Bindel N, Buchmann J, Dagdelen ö, Schwabe P (2015) TESLA: tightly-secure efficient signatures from standard lattices. Cryptology ePrint archive, report 2015/755. http://eprint.iacr.org/2015/755
  2. 2.
    Bos JW, Costello C, Naehrig M, Stebila D (2015) Post-quantum key exchange for the TLS protocol from the ring learning with errors problem. In: 2015 IEEE symposium on security and privacy, pp 553–570Google Scholar
  3. 3.
    Bos J, Costello C, Ducas L, Mironov I, Naehrig M, Nikolaenko V, Raghunathan A, Stebila D (2016) Frodo: take off the ring! practical, quantum-secure key exchange from LWE. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, CCS ’16, New York, NY, USA, pp 1006–1018. ACMGoogle Scholar
  4. 4.
    Pöppelmann T, Ducas L, Güneysu T (2014) Enhanced lattice-based signatures on reconfigurable hardware. In: Cryptographic hardware and embedded systems–CHES 2014: 16th international workshop. Busan, South Korea, September 23–26, pp 353–370. Proceedings. Springer, Berlin, HeidelbergGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.School of Computer ScienceUniversity of BirminghamBirminghamUK
  2. 2.ESAT—COSICKU LeuvenLeuvenBelgium

Personalised recommendations