Abstract
In this chapter we summarize the contributions of this work and point out some of the possible future directions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alkim E, Bindel N, Buchmann J, Dagdelen ö, Schwabe P (2015) TESLA: tightly-secure efficient signatures from standard lattices. Cryptology ePrint archive, report 2015/755. http://eprint.iacr.org/2015/755
Bos JW, Costello C, Naehrig M, Stebila D (2015) Post-quantum key exchange for the TLS protocol from the ring learning with errors problem. In: 2015 IEEE symposium on security and privacy, pp 553–570
Bos J, Costello C, Ducas L, Mironov I, Naehrig M, Nikolaenko V, Raghunathan A, Stebila D (2016) Frodo: take off the ring! practical, quantum-secure key exchange from LWE. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, CCS ’16, New York, NY, USA, pp 1006–1018. ACM
Pöppelmann T, Ducas L, GĂ¼neysu T (2014) Enhanced lattice-based signatures on reconfigurable hardware. In: Cryptographic hardware and embedded systems–CHES 2014: 16th international workshop. Busan, South Korea, September 23–26, pp 353–370. Proceedings. Springer, Berlin, Heidelberg
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Sinha Roy, S., Verbauwhede, I. (2020). Conclusions and Future Work. In: Lattice-Based Public-Key Cryptography in Hardware. Computer Architecture and Design Methodologies. Springer, Singapore. https://doi.org/10.1007/978-981-32-9994-8_6
Download citation
DOI: https://doi.org/10.1007/978-981-32-9994-8_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-32-9993-1
Online ISBN: 978-981-32-9994-8
eBook Packages: EngineeringEngineering (R0)