Skip to main content

Conclusions and Future Work

  • Chapter
  • First Online:
Lattice-Based Public-Key Cryptography in Hardware

Part of the book series: Computer Architecture and Design Methodologies ((CADM))

  • 684 Accesses

Abstract

In this chapter we summarize the contributions of this work and point out some of the possible future directions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 59.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alkim E, Bindel N, Buchmann J, Dagdelen ö, Schwabe P (2015) TESLA: tightly-secure efficient signatures from standard lattices. Cryptology ePrint archive, report 2015/755. http://eprint.iacr.org/2015/755

  2. Bos JW, Costello C, Naehrig M, Stebila D (2015) Post-quantum key exchange for the TLS protocol from the ring learning with errors problem. In: 2015 IEEE symposium on security and privacy, pp 553–570

    Google Scholar 

  3. Bos J, Costello C, Ducas L, Mironov I, Naehrig M, Nikolaenko V, Raghunathan A, Stebila D (2016) Frodo: take off the ring! practical, quantum-secure key exchange from LWE. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, CCS ’16, New York, NY, USA, pp 1006–1018. ACM

    Google Scholar 

  4. Pöppelmann T, Ducas L, GĂ¼neysu T (2014) Enhanced lattice-based signatures on reconfigurable hardware. In: Cryptographic hardware and embedded systems–CHES 2014: 16th international workshop. Busan, South Korea, September 23–26, pp 353–370. Proceedings. Springer, Berlin, Heidelberg

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sujoy Sinha Roy .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sinha Roy, S., Verbauwhede, I. (2020). Conclusions and Future Work. In: Lattice-Based Public-Key Cryptography in Hardware. Computer Architecture and Design Methodologies. Springer, Singapore. https://doi.org/10.1007/978-981-32-9994-8_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-32-9994-8_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-32-9993-1

  • Online ISBN: 978-981-32-9994-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics