Configurable device for lattice-based cryptography
A technology of cryptography and network nodes, applied in the direction of public keys for secure communication, secure communication devices, digital transmission systems, etc., and can solve problems such as solution destruction and failure to implement all solutions.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0072] While the invention may be embodied in many different forms, one or more specific embodiments are shown in the drawings and will now be described in detail, it being understood that this disclosure is considered as an illustration of the principles of the invention and is not intended to The invention is limited to the specific embodiments shown and described. Hereinafter, elements of the embodiment are described in operation for the sake of understanding. However, it will be apparent that the various elements are arranged to perform the functions described as being performed by them. Furthermore, the invention is not limited to the embodiments, and the invention lies in every novel feature or combination of features described herein or recited in mutually different dependent claims.
[0073] Recall that several lattice-based schemes exist for the design of Key Exchange (KEX) protocols, Key Encapsulation Mechanisms (KEM; also sometimes called Key Encapsulation Methods)...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



