Results 1 to 10 of about 4,998 (181)

Accelerating NTRU Encryption with Graphics Processing Units [PDF]

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2014
Lattice based cryptography is attractive for its quantum computing resistance and efficient encryption/ decryption process. However, the Big Data issue has perplexed most lattice based cryptographic systems since the overall processing is slowed down too
Tianyu Bai   +4 more
doaj   +1 more source

Rights or containment? The politics of Aboriginal cultural heritage in Victoria [PDF]

open access: yes, 2006
Aboriginal cultural heritage protection, and the legislative regimes that underpin it, constitute important mechanisms for Aboriginal people to assert their rights and responsibilities.
Porter, E.
core   +1 more source

Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application

open access: yesTongxin xuebao, 2021
To improve the practicability of homomorphic encryption in the application of multi-user cloud computing, a NTRU-based multi-key homomorphic proxy re-encryption (MKH-PRE) scheme was constructed.Firstly, a new form of NTRU-based multi-key ciphertext was ...
Ruiqi LI, Chunfu JIA, Yafei WANG
doaj   +2 more sources

BAT: Small and Fast KEM over NTRU Lattices

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
We present BAT – an IND-CCA secure key encapsulation mechanism (KEM) that is based on NTRU but follows an encryption/decryption paradigm distinct from classical NTRU KEMs.
Pierre-Alain Fouque   +3 more
doaj   +1 more source

Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search [PDF]

open access: yes, 2013
By applying Grover's quantum search algorithm to the lattice algorithms of Micciancio and Voulgaris, Nguyen and Vidick, Wang et al., and Pujol and Stehl\'{e}, we obtain improved asymptotic quantum results for solving the shortest vector problem.
A. Ambainis   +39 more
core   +2 more sources

Post-quantum cryptography-driven security framework for cloud computing

open access: yesOpen Computer Science, 2022
Data security in the cloud has been a major issue since the inception and adoption of cloud computing. Various frameworks have been proposed, and yet data breach prevails.
Ukwuoma Henry Chima   +3 more
doaj   +1 more source

Secret Sharing for Cloud Data Security

open access: yes, 2017
Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud ...
Attasena, Varunya   +2 more
core   +1 more source

Distribution of Inverses in Polynomial Rings [PDF]

open access: yes, 2001
NOTICE: this is the author's version of a work that was accepted for publication in Indagationes Mathematicae. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control ...
Banks, William David, 1964-   +1 more
core   +1 more source

Compact and Efficient Kems Over Ntru Lattices

open access: yesComputer Standards & Interfaces, 2023
The NTRU lattice is a promising candidate to construct practical cryptosystems, in particular key encapsulation mechanism (KEM), resistant to quantum computing attacks. Nevertheless, there are still some inherent obstacles to NTRU-based KEM schemes in having integrated performance, taking security, bandwidth, error probability, and computational ...
Zhichuang Liang   +3 more
openaire   +2 more sources

A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack

open access: yesJournal of Mathematical Cryptology, 2019
Over the past decade, the hybrid lattice-reduction and meet-in-the middle attack (called hybrid attack) has been used to evaluate the security of many lattice-based cryptographic schemes such as NTRU, NTRU Prime, BLISS and more.
Wunderer Thomas
doaj   +1 more source

Home - About - Disclaimer - Privacy