Results 31 to 40 of about 1,910 (90)
Estimate All the {LWE, NTRU} Schemes! [PDF]
We consider all LWE- and NTRU-based encryption, key encapsulation, and digital signature schemes proposed for standardisation as part of the Post-Quantum Cryptography process run by the US National Institute of Standards and Technology (NIST).
Albrecht, Martin R. +7 more
core +4 more sources
Criptografía postcuántica [PDF]
[ES] En esta memoria se realiza un estudio donde nos adentraremos brevemente en el mundo de la Criptografía Postcuántica para estudiar algunos de los avances producidos por el NIST sobre la búsqueda de nuevos sistemas criptográficos que puedan resistir ...
Miguel Salgado, Alba
core
Security Authentication Protocol for Underwater Sensor Networks Based on NTRU
Underwater Wireless Sensor Networks (UWSNs) have a wide range of applications, where issues related to data authentication and communication are critical for enhancing underwater resource utilization and ensuring secure data transmission.
Fan Jiang, Mingze Xu
semanticscholar +1 more source
Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4 [PDF]
This paper presents an optimized software implementation of the module-lattice-based key-encapsulation mechanism Kyber for the ARM Cortex-M4 microcontroller. Kyber is one of the round-2 candidates in the NIST post-quantum project.
Leon Botros +2 more
core
Faster NTRU-based Bootstrapping in less than 4 ms
Bootstrapping is a critical technique in constructing fully homomorphic encryption (FHE), which serves to refresh the noise in FHE ciphertexts, enabling an arbitrary number of homomorphic operations.
Zhihao Li +8 more
semanticscholar +1 more source
An Analysis of Potential Standards for Post-Quantum Cryptosystems [PDF]
In the near future, general quantum computers could become a reality. Because of this we have a need for updating our public key infrastructure to resist quantum attacks.
Welch, Zachary Donald
core +2 more sources
Binding BIKE errors to a key pair [PDF]
The KEM BIKE is a Round-3 alternative finalist in the NIST Post-Quantum Cryptography project. It uses the FO$^{\not \bot}$ transformation so that an instantiation with a decoder that has a DFR of $2^{-128}$ will make it IND-CCA secure.
Dusan Kostic, Nir Drucker, Shay Gueron
core
New NTRU Cryptosystem with Pauli Matrix
The NTRU public key cryptosystem was first presented by J. Hoffstein,J. H. Silverman and J. Pipher in 1996. This system is based on shortest and closest vector problem in a lattice and its operations are based on objects of a truncated polynomial ring ...
Priya Verma +2 more
semanticscholar +1 more source
Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange [PDF]
Key exchange protocols from the learning with errors (LWE) problem share many similarities with the Diffie–Hellman–Merkle (DHM) protocol, which plays a central role in securing our Internet.
Chi Cheng +5 more
core
Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4 [PDF]
We propose NTT implementations with each supporting at least one parameter of NTRU and one parameter of NTRU Prime. Our implementations are based on size-1440, size-1536, and size-1728 convolutions without algebraic assumptions on the target polynomial ...
Bo-Yin Yang, Erdem Alkim, Vincent Hwang
core +1 more source

