Results 41 to 50 of about 88 (52)
An Efficient Noncommutative NTRU from Semidirect Product [PDF]
NTRU is one of the most extensively studied lattice-based schemes. Its flexible design has inspired different proposals constructed over different rings, with some aiming to enhance security and others focusing on improving performance.
Aditi Kar Gangopadhyay +4 more
core
NTRU with Hints: Recovering NTRU Secret Keys from Partial Leakage [PDF]
NTRU-based structured lattices underpin several standardized post-quantum cryptographic schemes, most notably the Falcon signature algorithms.
Honglin Shao +3 more
core
Good Gottesman-Kitaev-Preskill codes from the NTRU cryptosystem [PDF]
We introduce a new class of random Gottesman-Kitaev-Preskill (GKP) codes derived from the cryptanalysis of the so-called NTRU cryptosystem. The derived codes are good in that they exhibit constant rate and average distance scaling Δ∝√n with high ...
Conrad, Jonathan +2 more
core +1 more source
De Componendis Cifris APS was formally established only in December 2022, but it has been active for many years in meetings and events. One of its initiatives has been the organization of many seminars.
Bazzanella, Danilo +3 more
core +1 more source
Compact Encryption based on Module-NTRU problems [PDF]
The Module-NTRU problem, introduced by Cheon, Kim, Kim, Son (IACR ePrint 2019/1468), and Chuengsatiansup, Prest, Stehlé, Wallet, Xagawa (ASIACCS ’20), generalizes the versatile NTRU assump- tion.
Hansraj Jangir +5 more
core
Improved Provable Reduction of NTRU and Hypercubic Lattices [PDF]
Lattice-based cryptography typically uses lattices with special properties to improve efficiency. We show how blockwise reduction can exploit lattices with special geometric properties, effectively reducing the required blocksize to solve the shortest ...
Henry Bambury, Phong Q. Nguyen
core
Résultants de polynômes de Ore et Cryptosystèmes de McEliece sur des Codes Rang faiblement structurés [PDF]
The most commonly used encryption techniques in cryptography are based on problems in number theory. Despite their efficiency, they are vulnerable to post-quantum cryptographic attack. Therefore it is relevant to study other types of cryptosystems.
Murat, Gaetan
core +2 more sources
DAWN: Smaller and Faster NTRU Encryption via Double Encoding [PDF]
This paper introduces DAWN, a compact and efficient NTRU encryption utilizing double encoding, which is provably secure under the NTRU assumption and the Ring-LWE assumption.
Xianhui Lu +4 more
core
On adapting NTRU for Post-Quantum Public-Key Encryption [PDF]
Dutto, Simone +2 more
core +1 more source
Seamless Transition to Post-Quantum TLS 1.3: A Hybrid Approach Using Identity-Based Encryption. [PDF]
Astrizi TL, Custódio R.
europepmc +1 more source

