Results 31 to 40 of about 1,910 (90)

Estimate All the {LWE, NTRU} Schemes! [PDF]

open access: yes, 2018
We consider all LWE- and NTRU-based encryption, key encapsulation, and digital signature schemes proposed for standardisation as part of the Post-Quantum Cryptography process run by the US National Institute of Standards and Technology (NIST).
Albrecht, Martin R.   +7 more
core   +4 more sources

Criptografía postcuántica [PDF]

open access: yes, 2021
[ES] En esta memoria se realiza un estudio donde nos adentraremos brevemente en el mundo de la Criptografía Postcuántica para estudiar algunos de los avances producidos por el NIST sobre la búsqueda de nuevos sistemas criptográficos que puedan resistir ...
Miguel Salgado, Alba
core  

Security Authentication Protocol for Underwater Sensor Networks Based on NTRU

open access: yesJournal of Marine Science and Engineering
Underwater Wireless Sensor Networks (UWSNs) have a wide range of applications, where issues related to data authentication and communication are critical for enhancing underwater resource utilization and ensuring secure data transmission.
Fan Jiang, Mingze Xu
semanticscholar   +1 more source

Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4 [PDF]

open access: yes, 2019
This paper presents an optimized software implementation of the module-lattice-based key-encapsulation mechanism Kyber for the ARM Cortex-M4 microcontroller. Kyber is one of the round-2 candidates in the NIST post-quantum project.
Leon Botros   +2 more
core  

Faster NTRU-based Bootstrapping in less than 4 ms

open access: yesIACR Trans. Cryptogr. Hardw. Embed. Syst.
Bootstrapping is a critical technique in constructing fully homomorphic encryption (FHE), which serves to refresh the noise in FHE ciphertexts, enabling an arbitrary number of homomorphic operations.
Zhihao Li   +8 more
semanticscholar   +1 more source

An Analysis of Potential Standards for Post-Quantum Cryptosystems [PDF]

open access: yes, 2019
In the near future, general quantum computers could become a reality. Because of this we have a need for updating our public key infrastructure to resist quantum attacks.
Welch, Zachary Donald
core   +2 more sources

Binding BIKE errors to a key pair [PDF]

open access: yes, 2021
The KEM BIKE is a Round-3 alternative finalist in the NIST Post-Quantum Cryptography project. It uses the FO$^{\not \bot}$ transformation so that an instantiation with a decoder that has a DFR of $2^{-128}$ will make it IND-CCA secure.
Dusan Kostic, Nir Drucker, Shay Gueron
core  

New NTRU Cryptosystem with Pauli Matrix

open access: yesInternational Journal of Scientific Research in Science and Technology
The NTRU public key cryptosystem was first presented by J. Hoffstein,J. H. Silverman and J. Pipher in 1996. This system is based on shortest and closest vector problem in a lattice and its operations are based on objects of a truncated polynomial ring ...
Priya Verma   +2 more
semanticscholar   +1 more source

Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange [PDF]

open access: yes, 2022
Key exchange protocols from the learning with errors (LWE) problem share many similarities with the Diffie–Hellman–Merkle (DHM) protocol, which plays a central role in securing our Internet.
Chi Cheng   +5 more
core  

Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4 [PDF]

open access: yes, 2022
We propose NTT implementations with each supporting at least one parameter of NTRU and one parameter of NTRU Prime. Our implementations are based on size-1440, size-1536, and size-1728 convolutions without algebraic assumptions on the target polynomial ...
Bo-Yin Yang, Erdem Alkim, Vincent Hwang
core   +1 more source

Home - About - Disclaimer - Privacy