Results 41 to 50 of about 88 (52)

An Efficient Noncommutative NTRU from Semidirect Product [PDF]

open access: yes
NTRU is one of the most extensively studied lattice-based schemes. Its flexible design has inspired different proposals constructed over different rings, with some aiming to enhance security and others focusing on improving performance.
Aditi Kar Gangopadhyay   +4 more
core  

NTRU with Hints: Recovering NTRU Secret Keys from Partial Leakage [PDF]

open access: yes
NTRU-based structured lattices underpin several standardized post-quantum cryptographic schemes, most notably the Falcon signature algorithms.
Honglin Shao   +3 more
core  

Good Gottesman-Kitaev-Preskill codes from the NTRU cryptosystem [PDF]

open access: yes
We introduce a new class of random Gottesman-Kitaev-Preskill (GKP) codes derived from the cryptanalysis of the so-called NTRU cryptosystem. The derived codes are good in that they exhibit constant rate and average distance scaling Δ∝√n with high ...
Conrad, Jonathan   +2 more
core   +1 more source

DE CIFRIS SEMINARS [PDF]

open access: yes
De Componendis Cifris APS was formally established only in December 2022, but it has been active for many years in meetings and events. One of its initiatives has been the organization of many seminars.
Bazzanella, Danilo   +3 more
core   +1 more source

Compact Encryption based on Module-NTRU problems [PDF]

open access: yes
The Module-NTRU problem, introduced by Cheon, Kim, Kim, Son (IACR ePrint 2019/1468), and Chuengsatiansup, Prest, Stehlé, Wallet, Xagawa (ASIACCS ’20), generalizes the versatile NTRU assump- tion.
Hansraj Jangir   +5 more
core  

Improved Provable Reduction of NTRU and Hypercubic Lattices [PDF]

open access: yes
Lattice-based cryptography typically uses lattices with special properties to improve efficiency. We show how blockwise reduction can exploit lattices with special geometric properties, effectively reducing the required blocksize to solve the shortest ...
Henry Bambury, Phong Q. Nguyen
core  

Résultants de polynômes de Ore et Cryptosystèmes de McEliece sur des Codes Rang faiblement structurés [PDF]

open access: yes, 2014
The most commonly used encryption techniques in cryptography are based on problems in number theory. Despite their efficiency, they are vulnerable to post-quantum cryptographic attack. Therefore it is relevant to study other types of cryptosystems.
Murat, Gaetan
core   +2 more sources

DAWN: Smaller and Faster NTRU Encryption via Double Encoding [PDF]

open access: yes
This paper introduces DAWN, a compact and efficient NTRU encryption utilizing double encoding, which is provably secure under the NTRU assumption and the Ring-LWE assumption.
Xianhui Lu   +4 more
core  

On adapting NTRU for Post-Quantum Public-Key Encryption [PDF]

open access: yes
Dutto, Simone   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy