ALGEBRAIC CRYPTANALYSIS ON NTRU-HPS AND NTRU-HRSS [PDF]
NTRU is a lattice-based public-key cryptosystem designed by Hoffstein, Pipher, and Silverman in 1996. NTRU published on Algorithmic Number Theory Symposium (ANTS) in 1998.
Fadila Paradise, Kiki Ariyanti Sugeng
doaj +4 more sources
Polynomial equation in algebraic attack on NTRU-HPS and NTRU-HRSS [PDF]
NTRU is a lattice-based public-key cryptosystem designed by Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman in 1996. NTRU published on Algorithmic Number Theory Symposium (ANTS) in 1998.
Paradise Fadila, Sugeng Kiki Ariyanti
doaj +2 more sources
The emergence of large-scale quantum computers threatens the long-term security of classical public-key cryptosystems, making the integration of post-quantum cryptography (PQC) essential for resource-constrained embedded and IoT platforms.
Tri-Duc Ta +3 more
doaj +1 more source
Non-Invertible Public Key Certificates. [PDF]
Lizama-Perez LA, López R JM.
europepmc +1 more source
Seamless Transition to Post-Quantum TLS 1.3: A Hybrid Approach Using Identity-Based Encryption. [PDF]
Astrizi TL, Custódio R.
europepmc +1 more source
A Novel Approach to Communicate Secret Message Between Users Using Sponge Function Technique on NTRU [PDF]
This paper presents a novel approach for a (key distribution) for secret message communication among a group (G). In order to increase security to distribute secret message (key), we introduce sponge functions using these at a specific permutation.
Avadhani, P. S. (P) +2 more
core +4 more sources
Single-Trace Side-Channel Attacks on ω-Small Polynomial Sampling: With Applications to NTRU, NTRU Prime, and CRYSTALS-DILITHIUM [PDF]
This paper proposes a new single-trace side-channel attack on lattice-based post-quantum protocols. We target the ω-small polynomial sampling of NTRU, NTRU Prime, and CRYSTALS-DILITHIUM algorithm implementations (which are NIST Round-3 finalists and ...
Aydin Aysu, Emre Karabulut, Erdem Alkim
core
High-Speed Hardware Architectures and FPGA Benchmarking of CRYSTALS-Kyber, NTRU, and Saber [PDF]
Performance in hardware has typically played a significant role in differentiating among leading candidates in cryptographic standardization efforts. Winners of two past NIST cryptographic contests (Rijndael in case of AES and Keccak in case of SHA-3 ...
Kamyar Mohajerani +2 more
core
New NTRU Records with Improved Lattice Bases [PDF]
The original NTRU cryptosystem from 1998 can be considered the starting point of the great success story of lattice-based cryptography. Modern NTRU versions like NTRU-HPS and NTRU-HRSS are round-3 finalists in NIST\u27s selection process, and also ...
Alexander May +2 more
core
Homomorphic Evaluation of the Integer Arithmetic Operations for Mobile Edge Computing
With the rapid development of the 5G network and Internet of Things (IoT), lots of mobile and IoT devices generate massive amounts of multisource heterogeneous data. Effective processing of such data becomes an urgent problem. However, traditional centralised models of cloud computing are challenging to process multisource heterogeneous data ...
Changqing Gong +5 more
wiley +1 more source

