{"title":"椭圆曲线与点阵密码的比较分析","authors":"A. Davenport, S. Shetty","doi":"10.23919/ANNSIM52504.2021.9552144","DOIUrl":null,"url":null,"abstract":"In this paper, we provide a mathematical background and analysis of Lattice Based Cryptography for the less mathematically mature reader. Discussing the benefits and constraints of Lattice Based Crypto, we compare and contrast with Elliptic Curve Cryptography to provide an understanding of what the limitations of Lattice Based Cryptography are, and what needs to be achieved for the quantum resistant protocols to be deploy-able to any and all devices.","PeriodicalId":6782,"journal":{"name":"2021 Annual Modeling and Simulation Conference (ANNSIM)","volume":"37 1","pages":"1-9"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Comparative Analysis of Elliptic Curve and Lattice Based Cryptography\",\"authors\":\"A. Davenport, S. Shetty\",\"doi\":\"10.23919/ANNSIM52504.2021.9552144\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we provide a mathematical background and analysis of Lattice Based Cryptography for the less mathematically mature reader. Discussing the benefits and constraints of Lattice Based Crypto, we compare and contrast with Elliptic Curve Cryptography to provide an understanding of what the limitations of Lattice Based Cryptography are, and what needs to be achieved for the quantum resistant protocols to be deploy-able to any and all devices.\",\"PeriodicalId\":6782,\"journal\":{\"name\":\"2021 Annual Modeling and Simulation Conference (ANNSIM)\",\"volume\":\"37 1\",\"pages\":\"1-9\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 Annual Modeling and Simulation Conference (ANNSIM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/ANNSIM52504.2021.9552144\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Annual Modeling and Simulation Conference (ANNSIM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/ANNSIM52504.2021.9552144","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comparative Analysis of Elliptic Curve and Lattice Based Cryptography
In this paper, we provide a mathematical background and analysis of Lattice Based Cryptography for the less mathematically mature reader. Discussing the benefits and constraints of Lattice Based Crypto, we compare and contrast with Elliptic Curve Cryptography to provide an understanding of what the limitations of Lattice Based Cryptography are, and what needs to be achieved for the quantum resistant protocols to be deploy-able to any and all devices.