Results 231 to 240 of about 16,532 (241)
Some of the next articles are maybe not open access.

A New Decryption Failure Attack Against HQC

2020
HQC is an IND-CCA2 KEM running for standardization in NIST’s post-quantum cryptography project and has advanced to the second round. It is a code-based scheme in the class of public key encryptions, with given sets of parameters spanning NIST security strength 1, 3 and 5, corresponding to 128, 192 and 256 bits of classic security.
Qian Guo, Thomas Johansson
openaire   +1 more source

Decryption Failure Is More Likely After Success

2020
The user of an imperfectly correct lattice-based public-key encryption scheme leaks information about their secret key with each decryption query that they answer—even if they answer all queries successfully. Through a refinement of the D’Anvers–Guo–Johansson–Nilsson–Vercauteren–Verbauwhede failure boosting attack, we show that an adversary can use ...
Nina Bindel, John M. Schanck
openaire   +1 more source

The Influence of LWE/RLWE Parameters on the Stochastic Dependence of Decryption Failures

2020
Learning with Errors (LWE) and Ring-LWE (RLWE) problems allow the construction of efficient key exchange and public-key encryption schemes. However, while improving the security through the use of error distributions with large standard deviations, the decryption failure rate increases as well.
Georg Maringer   +2 more
openaire   +1 more source

Decrypting Causes of Sand Control Failure and Improving Productivity of Multi Zone Single Trip Gravel Pack

International Petroleum Technology Conference, 2015
Abstract Multi Zone Single Trip Gravel Pack (MZ-STGP) system has been the solution for developing sand prone reservoirs in the Mahakam Delta, Indonesia. Despite providing cost effective solutions, few sand control failures has been recorded.
R. Wijaya   +3 more
openaire   +1 more source

NTRU Binary Polynomials Parameters Selection for Reduction of Decryption Failure

2016
This paper studies the NTRU public key cryptosystem to identify the most influential parameters for decryption failure confirming that decryption failure is key-dependent. The study uses binary polynomials and analyzes the correlation between the parameter sets recommended in the EESS 1v2 (2003) and Jeffrey Hoffstein et al. (2003).
Juliet N. Gaithuru   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy