Lattice-based cryptography | Cryptography | Post-quantum cryptography

Ring learning with errors signature

Digital signatures are a means to protect digital information from intentional modification and to authenticate the source of digital information. Public key cryptography provides a rich set of different cryptographic algorithms the create digital signatures. However, the primary public key signatures currently in use (RSA and Elliptic Curve Signatures) will become completely insecure if scientists are ever able to build a moderately sized quantum computer. Post quantum cryptography is a class of cryptographic algorithms designed to be resistant to attack by a quantum cryptography. Several post quantum digital signature algorithms based on hard problems in lattices are being created replace the commonly used RSA and elliptic curve signatures. A subset of these lattice based scheme are based on a problem known as Ring learning with errors. Ring learning with errors based digital signatures are among the post quantum signatures with the smallest public key and signature sizes (Wikipedia).

Video thumbnail

Katherine E. Stange: Ring learning with errors and rounding

CIRM HYBRID EVENT Among the main candidates for post-quantum cryptography are systems based on the Ring Learning with Errors and Ring Learning with Rounding problems. I’ll give an overview of the number theory involved in these problems and try to persuade you to join in cryptanalyzing th

From playlist Number Theory

Video thumbnail

Convincing Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Isaac David Smith - Quantum error correcting codes

In his first talk on the subject of quantum error correcting codes, Isaac introduces the concepts of error channels and and an error correction procedure. He proves the main theorem which characterises when an error correction procedure can exist, which will be used in the sequel to prove

From playlist Quantum computing seminar

Video thumbnail

Hamming Code - Errors

How to detect and correct an error using the Hamming Code. Hamming codes are a type of linear code, see link for intro to linear code: https://www.youtube.com/watch?v=oYONDEX2sh8 Questions? Feel free to post them in the comments and I'll do my best to answer!

From playlist Cryptography and Coding Theory

Video thumbnail

Signing - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Signal reconstruction

A discrete signal has to be reconstructed to get back into the continuous domain.

From playlist Discrete

Video thumbnail

Cryptography 101

Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation funct

From playlist Blockchain

Video thumbnail

Chris Peikert - Post Quantum assumptions - IPAM at UCLA

Recorded 27 July 2022. Chris Peikert of the University of Michigan presents "Post Quantum assumptions" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Learn more online at: https://www.ipam.ucla.edu/programs/summer-schools/graduate-summer-school-on-post-quantum-and-

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Video thumbnail

Determining Signal Similarities

Get a Free Trial: https://goo.gl/C2Y9A5 Get Pricing Info: https://goo.gl/kDvGHt Ready to Buy: https://goo.gl/vsIeA5 Find a signal of interest within another signal, and align signals by determining the delay between them using Signal Processing Toolbox™. For more on Signal Processing To

From playlist Signal Processing and Communications

Video thumbnail

0432 - Rust: rewriting game front-end using Yew

This is #432 in my series of live (Twitch) coding streams. This stream I got the admin authentication system up and running in the Rust rewrite of my game. Notebook page: https://tinyurl.com/4sfsy752 -- Watch live at https://www.twitch.tv/rhymu8354

From playlist Excalibur

Video thumbnail

Clarke Exobelts: A Possible Alien Technosignature?

These hangouts are sponsored by OPT Telescopes: https://optcorp.com/collections/pro-services? utm_source=deepastronomy&utm_medium=telescopetalk&utm_campaign=pro https://optcorp.com/collections/pro-services?utm_source=deepastronomy&utm_medium=telescopetalk&utm_campaign=pro To find a techni

From playlist Technosignatures Playlist

Video thumbnail

0431 - Rust: rewriting game front-end using Yew

This is #431 in my series of live (Twitch) coding streams. This stream I worked on importing a private RSA key into my game's Rust front-end and using that key to construct the response to an authentication challenge. Notebook page: https://tinyurl.com/38zmczmb -- Watch live at https

From playlist Excalibur

Video thumbnail

Adeline Roux-Langlois : Using structured variants in lattice-based cryptography - Lecture 2

CONFERENCE Recording during the thematic meeting : « Francophone Computer Algebra Days» the March 07, 2023 at the Centre International de Rencontres Mathématiques (Marseille, France) Filmmaker : Guillaume Hennenfent Find this video and other talks given by worldwide mathematicians on CIR

From playlist Mathematical Aspects of Computer Science

Video thumbnail

Mathematical Ideas in Lattice Based Cryptography - Jill Pipher

2018 Program for Women and Mathematics Topic: Mathematical Ideas in Lattice Based Cryptography Speaker: Jill Pipher Affiliation: Brown University Date: May 21, 2018 For more videos, please visit http://video.ias.edu

From playlist Mathematics

Video thumbnail

RustConf 2017 - Fast, Safe, Pure-Rust Elliptic Curve Cryptography

Fast, Safe, Pure-Rust Elliptic Curve Cryptography by Isis Lovecruft & Henry De Valence This talk discusses the design and implementation of curve25519-dalek, a pure-Rust implementation of operations on the elliptic curve known as Curve25519. We will discuss the goals of the library and g

From playlist RustConf 2017

Video thumbnail

RustConf 2017 - Fast, Safe, Pure-Rust Elliptic Curve Cryptography

Fast, Safe, Pure-Rust Elliptic Curve Cryptography by Isis Lovecruft & Henry De Valence This talk discusses the design and implementation of curve25519-dalek, a pure-Rust implementation of operations on the elliptic curve known as Curve25519. We will discuss the goals of the library and gi

From playlist RustConf 2017

Video thumbnail

Live Stream part 2 - Creating a twitter vacuum

I almost got the auth working, but then it turned out that it didn't -- Watch live at https://www.twitch.tv/brookzerker

From playlist Node.js Programming

Video thumbnail

Cryptograph: Substitution Cipher (Caesar Cipher)

This lesson explains how to encrypt and decrypt a message using a Caeser cipher. Site: http://mathispower4u.com

From playlist Cryptography

Related pages

Qubit | Rejection sampling | Shor's algorithm | Post-quantum cryptography | One-way function | Finite field | Digital signature | Coefficient | Learning with errors | Discrete logarithm | Cryptographic hash function | Ring learning with errors | Public-key cryptography | Elliptic Curve Digital Signature Algorithm | RSA (cryptosystem) | BLISS signature scheme | Quantum computing