Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.

Well done!

You have completed (UPI) Chapter 16: Emerging Technologies in Cybersecurity!

Instruction

16.4.3 PUF-Based Key Distribution for LWR Lattice Cryptography

There are some similarities between LWE and LWR implementations. In the case of LWR, the seed k from the PUF is only used to generate one vector, 𝑠1(i) while a constant vector ℎ(i) can be generated independently. The public vector 𝑡(i) is computed in a similar way: 𝑡(i)← 𝐴(i)⋅ 𝑠1(i) + ℎ(i)