Results 21 to 30 of about 89 (53)

A Side-Channel Assisted Attack on NTRU [PDF]

open access: yes, 2021
We take a look at the current implementation of NTRU submitted to the NIST post-quantum standardization project, and identify two strong sources of leakage in the unpacking of the secret key.
Amund Askeland, Sondre Rønjom
core  

A survey on post‐quantum based approaches for edge computing security

open access: yesWIREs Computational Statistics, Volume 16, Issue 1, January/February 2024.
The distribution of reviewed papers by focused area. Abstract With the development of technology and its integration with scientific realities, computer systems continue to evolve as infrastructure. One of the most important obstacles in front of quantum computers with high‐speed processing is that its existing systems cause security vulnerabilities ...
Aykut Karakaya, Ahmet Ulu
wiley   +1 more source

Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4 [PDF]

open access: yes, 2022
We propose NTT implementations with each supporting at least one parameter of NTRU and one parameter of NTRU Prime. Our implementations are based on size-1440, size-1536, and size-1728 convolutions without algebraic assumptions on the target polynomial ...
Bo-Yin Yang, Erdem Alkim, Vincent Hwang
core   +1 more source

A Comparison of NTRU Variants [PDF]

open access: yes, 2018
We analyze the size vs. security trade-offs that are available when selecting parameters for perfectly correct key encapsulation mechanisms based on ...
John M. Schanck
core  

Performance and Efficiency Exploration of Hardware Polynomial Multipliers for Post-Quantum Lattice-Based Cryptosystems [PDF]

open access: yes
The significant effort in the research and design of large-scale quantum computers has spurred a transition to post-quantum cryptographic primitives worldwide.
Antognazza, Francesco   +3 more
core   +1 more source

Cache-22: A Highly Deployable End-To-End Encrypted Cache System with Post-Quantum Security [PDF]

open access: yes, 2022
Cache systems are crucial for reducing communication overhead on the Internet. The importance of communication privacy is being increasingly and widely recognized; therefore, we anticipate that nearly all end-to-end communication will be encrypted via ...
Keita Emura   +3 more
core  

A note on Post Quantum Onion Routing [PDF]

open access: yes, 2021
Even though the currently used encryption and signature schemes are well tested and secure in a classical computational setting, they are not quantum-resistant as Shor\u27s work proves.
Kelesidis Evgnosia-Alexandra
core  

Too Many Hints - When LLL Breaks LWE [PDF]

open access: yes, 2023
All modern lattice-based schemes build on variants of the LWE problem. Information leakage of the LWE secret $\mathbf s \in \mathbb{Z}_q^n$ is usually modeled via so-called hints, i.e., inner products of $\mathbf s$ with some (random, but known) vector.
Alexander May, Julian Nowakowski
core  

Streamlined NTRU Prime on FPGA [PDF]

open access: yes, 2022
We present a novel full hardware implementation of Streamlined NTRU Prime, with two variants: A high-speed, high-area implementation, and a slower, low-area implementation.
Adrian Marotzke   +4 more
core  

On the Success Probability of Solving Unique SVP via BKZ [PDF]

open access: yes, 2021
As lattice-based key encapsulation, digital signature, and fully homomorphic encryption schemes near standardisation, ever more focus is being directed to the precise estimation of the security of these schemes.
Eamonn W. Postlethwaite   +1 more
core  

Home - About - Disclaimer - Privacy