Results 41 to 50 of about 1,910 (90)

Post-Quantum Security: Opportunities and Challenges. [PDF]

open access: yesSensors (Basel), 2023
Li S   +7 more
europepmc   +1 more source

Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. [PDF]

open access: yesSensors (Basel), 2023
Farooq S   +6 more
europepmc   +1 more source

A Novel CCA Attack for NTRU+ KEM [PDF]

open access: yes, 2023
The KpqC competition has begun in 2022, that aims to standardize Post-Quantum Cryptography (PQC) in the Republic of Korea. Among the 16 submissions of the KpqC competition, the lattice-based schemes exhibit the most promising and balanced features in ...
Jaehui Park, Joohee Lee, Minju Lee
core  

How Germany Can Improve Its Standing in Post-Quantum Cryptography [PDF]

open access: yes
In diesem DGAP Policy Brief werden die Auswirkungen des vor zwei Jahren begonnenen Übergangs zur Post-Quanten-Kryptographie (Post-Quantum Cryptography, PQC) untersucht.
Pericàs Riera, Maria, Weber, Valentin
core   +1 more source

Lossless Data Hiding in NTRU Cryptosystem by Polynomial Encoding and Modulation

open access: yesIEEE Transactions on Information Forensics and Security
Lossless data hiding in ciphertexts (LDH-CT) is to perform data embedding without changing their plaintexts, which can be used to transmit extra data in the applications of homomorphic encryption at little cost. In this paper, two LDH-CT algorithms named
Hao-Tian Wu   +5 more
semanticscholar   +1 more source

Towards KEM Unification [PDF]

open access: yes, 2018
This paper highlights a particular construction of a correct KEM without failures and without ciphertext expansion from any correct deterministic PKE, and presents a simple tight proof of ROM IND-CCA2 security for the KEM assuming merely OW-CPA security ...
Daniel J. Bernstein   +1 more
core  

FINALLY: A Multi-Key FHE Scheme Based on NTRU and LWE

open access: yesIACR Cryptology ePrint Archive
Multi-key fully homomorphic encryption (MKFHE), a generalization of fully homomorphic encryption (FHE), enables a computation over encrypted data under multiple keys.
Jeongeun Park   +2 more
semanticscholar   +1 more source

Single-Trace Side-Channel Attacks on NTRU Implementation

open access: yesSN Computer Science
Most of the currently used cryptosystems are not secure in the presence of cryptographically relevant quantum computers. As the research in quantum technologies proceeds, a need for quantum-safe cryptography is imminent. NTRU is a post-quantum public-key
Tomáš Rabas, J. Bucek, R. Lórencz
semanticscholar   +1 more source

On the Development and Standardisation of Post-Quantum Cryptography - A Synopsis of the NIST Post-Quantum Cryptography Standardisation Process, its Incentives, and Submissions [PDF]

open access: yes, 2018
Due to developments within the field of quantum computers, the need for developing and implementing quantum-resistant cryptographic algorithms has become more urgent.
Legernæs, Maja Worren
core  

Home - About - Disclaimer - Privacy