Results 1 to 10 of about 4,957 (182)

Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism [PDF]

open access: yesPeerJ Computer Science, 2023
In this article, we propose a double-NTRU (D-NTRU)-based key encapsulation mechanism (KEM) for the key agreement requirement of the post-quantum world. The proposed KEM is obtained by combining one-way D-NTRU encryption and Dent’s KEM design method.
Kübra Seyhan, Sedat Akleylek
doaj   +3 more sources

ALGEBRAIC CRYPTANALYSIS ON NTRU-HPS AND NTRU-HRSS

open access: yesBarekeng, 2023
NTRU is a lattice-based public-key cryptosystem designed by Hoffstein, Pipher, and Silverman in 1996. NTRU published on Algorithmic Number Theory Symposium (ANTS) in 1998.
Fadila Paradise, Kiki Ariyanti Sugeng
doaj   +2 more sources

Practical NTRU Signcryption in the Standard Model [PDF]

open access: yesEntropy, 2023
Based on the NTRU trapdoor used in NIST’s Falcon, a signcryption scheme following the sign-then-encrypt paradigm is constructed. The existing partitioning technique based on Waters hash over the lattice can not complete the security reduction in the ...
Jianhua Yan   +5 more
doaj   +2 more sources

NTRU-Like Random Congruential Public-Key Cryptosystem for Wireless Sensor Networks [PDF]

open access: yesSensors, 2020
Wireless sensor networks (WSNs) are the core of the Internet of Things and require cryptographic protection. Cryptographic methods for WSN should be fast and consume low power as these networks rely on battery-powered devices and microcontrollers.
Anas Ibrahim   +5 more
doaj   +2 more sources

NTRU-MCF: A Chaos-Enhanced Multidimensional Lattice Signature Scheme for Post-Quantum Cryptography [PDF]

open access: yesSensors
To address the growing threat of quantum computing to classical cryptographic primitives, this study introduces NTRU-MCF, a novel lattice-based signature scheme that integrates multidimensional lattice structures with fractional-order chaotic systems. By
Rong Wang, Bo Yuan, Minfu Yuan, Yin Li
doaj   +2 more sources

Polynomial equation in algebraic attack on NTRU-HPS and NTRU-HRSS [PDF]

open access: yesITM Web of Conferences
NTRU is a lattice-based public-key cryptosystem designed by Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman in 1996. NTRU published on Algorithmic Number Theory Symposium (ANTS) in 1998.
Paradise Fadila, Sugeng Kiki Ariyanti
doaj   +2 more sources

Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
We propose NTT implementations with each supporting at least one parameter of NTRU and one parameter of NTRU Prime. Our implementations are based on size-1440, size-1536, and size-1728 convolutions without algebraic assumptions on the target polynomial ...
Erdem Alkim, Vincent Hwang, Bo-Yin Yang
doaj   +5 more sources

A Novel Approach to Communicate Secret Message between Users Using Sponge Function Technique on NTRU [PDF]

open access: yesInternational Journal of Science and Engineering, 2013
This paper presents a novel approach for a (key distribution) for secret message communication among a group (G). In order to increase security to distribute secret message (key), we introduce sponge functions using these at a specific permutation.
S. Varaprasad   +2 more
doaj   +3 more sources

Comparison of Security Performance of NTRU and ECC Algorithms For RFID Authentication [PDF]

open access: yesE3S Web of Conferences, 2023
The rapid development of the Internet of Things creates information security vulnerabilities due to the unavoidable process of exchanging data. One device that is vulnerable to data security is RFID.
Bambang Harjito   +1 more
doaj   +1 more source

NTRU Over Galois Rings [PDF]

open access: yesApplied Mathematics and Nonlinear Sciences, 2020
Abstract As a cryptosystem, Nth Truncated Polynomial Ring (NTRU) is established on the fast and easy calculation. Improving the security is aimed by enlarging a ring where the processes execute and enhancing the number of a private key and a public key.
Sever, Mehmet, Ozdemir, Ahmet Sukru
openaire   +5 more sources

Home - About - Disclaimer - Privacy