O'Reilly logo

A Course in Mathematical Cryptography by Gerhard Rosenberger, Martin Kreuzer, Benjamin Fine, Gilbert Baumslag

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

15 Lattice-Based Cryptography

15.1  Lattice-Based Cryptography

Lattice-based cryptography refers to asymmetric cryptographic protocols based on the use of lattices. These types of protocols are of interest because they can be efficiently constructed with good key spaces and in some cases there are true security proofs tying them to provably hard problems. There has been a great deal of research on lattice methods and in this final chapter we give an overview of this area.

While lattice-based cryptography has been studied for several decades, there has been renewed interest in lattice-based techniques as prospects for a real quantum computer improve. Unlike more widely used and known public key cryptography such as the RSA or Diffie-Hellman cryptosystems ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required