Results 71 to 80 of about 1,910 (90)
Some of the next articles are maybe not open access.

A NTRU-Based Data Deduplication Scheme for Underwater Acoustic Sensor Networks

IEEE Sensors Journal
Data security and storage capacity have become more important as a result of the extensive use of underwater acoustic sensor networks (UWSNs) in fields including military applications, national defense, and marine resource research.
Mingze Xu, Tongtong Guo
semanticscholar   +1 more source

On the Semantic Security of NTRU - with a gentle introduction to cryptography

arXiv.org
This paper provides an explanation of NTRU, a post quantum encryption scheme, while also providing a gentle introduction to cryptography. NTRU is a very efficient lattice based cryptosystem that appears to be safe against attacks by quantum computers ...
Liam Peet-Paré
semanticscholar   +1 more source

Symplectic enumeration reduction algorithm for lattice-based post-quantum cryptography NTRU

The International Conference Optoelectronic Information and Optical Engineering
The enumeration reduction algorithm is a practical method for solving the shortest vector problem(SVP) in lattice theory, and it plays an important role in analyzing the security of lattice-based post-quantum cryptography NTRU(Number Theory Research Unit)
Xinjian Li, Chengtao Wang, Chaohai Xie
semanticscholar   +1 more source

Implementation of Number Theoretic Transform Unit (NTRU) Cryptography to Secure Text Files

Journal of Artificial Intelligence and Engineering Applications (JAIEA)
This research aims to develop a text file security system using the NTRU cryptographic algorithm. This process begins with understanding the basic principles of NTRU, which uses a polynomial-based mathematical structure to generate key pairs.
Arta Naila Fanaya   +2 more
semanticscholar   +1 more source

Leveled Homomorphic Encryption Based on NTRU Without Re-Linearization

International Journal of Information Security and Privacy
The hardness of the NTRU problem has not been well understood until 2021, when Pellet-Mary and Stehlé (2021) gave a reduction from the Gap-SVP problem on the ideal lattice to the NTRU-Search problem.
Xiaokang Dai   +3 more
semanticscholar   +1 more source

Improved Decryption Bounds and Key Generation for Matrix NTRU over Integral Domain

Anais do XXV Simpósio Brasileiro de Cibersegurança (SBSeg 2025)
Shor’s algorithm [Shor 1994] is the main threat to classical public-key cryptography. Since its introduction in 1996, NTRU and its variants aim to develop cryptographic algorithms that are secure even against quantum computers. In this work, we study the
Thiago do Rêgo Sousa   +1 more
semanticscholar   +1 more source

Tight Quantum-Security Bounds and Parameter Optimization for SPHINCS+ and NTRU

arXiv.org
The imminent threat of quantum computing necessitates quantum-resistant cryptosystems. This paper establishes tight security bounds for two NIST PQC finalists: SPHINCS+ (hash-based) and NTRU (lattice-based).
Ruopengyu Xu, Chenglian Liu
semanticscholar   +1 more source

Tailoring a Genetic Algorithm for searching Shortest Lattice Vector in NTRU Lattices

Anais do XXV Simpósio Brasileiro de Cibersegurança (SBSeg 2025)
The NTRU cryptosystem relies on the hardness of the Shortest Vector Problem (SVP), a central challenge in lattice-based cryptography. While genetic algorithms (GAs) have shown promise in solving SVP on generic lattices, little attention has been given to
Raul Caram de Assis   +1 more
semanticscholar   +1 more source

Revocable IBE with Decryption Key Exposure Resistance from NTRU Lattice

International Conference on Enterprise Systems
Revocable identity-based encryption (RIBE) adds a key revocation mechanism to traditional identity-based encryption (IBE), enabling dynamic key management for key management or key expiration.
Dandan Zhang, Shanqiang Feng, Fengyin Li
semanticscholar   +1 more source

Accelerating PEGASUS by Applying NTRU-Based GSW-Like Encryption

International Conference on Security and Cryptography
: Fully homomorphic encryption (FHE) enables to execute operations on ciphertexts without decryption. This leads to an expectation on FHE to be applied to analyses of confidential data.
Shusaku Uemura, Kazuhide Fukushima
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy