Results 91 to 100 of about 4,957 (182)

On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Lattice‐based encryption schemes are significant cryptographic primitives to defend information security against quantum menace, and the decryption failure rate is related to both theoretical and realistic security. We quantitatively analyze how the floating‐point arithmetic and neglecting small probabilities impact the precision, and propose a new ...
Lin Wang   +3 more
wiley   +1 more source

Using quantum key distribution for cryptographic purposes: a survey

open access: yes, 2014
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone
,   +23 more
core   +3 more sources

A Post-Quantum Secure RFID Authentication Protocol Based on NTRU Encryption Algorithm

open access: yesSensors
As a non-contact identification technology, RFID (Radio Frequency Identification) is widely used in various Internet of Things applications. However, RFID systems are highly vulnerable to diverse attacks due to the openness of communication links between
Hu Liu   +3 more
doaj   +1 more source

Innovative Ways to Resolution of Native Title in Australia: Promoting Secure Futures on Pastoral Country [PDF]

open access: yes
Negotiated agreements between traditional owners and pastoralists about use and management of lands held under pastoral lease tenures in the arid and semi-arid rangelands of Australia will promote secure futures for both parties.
Agius, Parry   +2 more
core   +1 more source

NTRU kriptosustav [PDF]

open access: yes, 2015
Most of today’s public key cryptosystems are based on two hard mathematical problems: factoring large integers and discrete logarithm problem. With possible advent of quantum computers, these problems can become solvable. This paper describes the NTRU cryptosystem, cryptosystem that is known to not be vulnerable to quantum computer based attacks.
openaire   +1 more source

Algorithms on Ideal over Complex Multiplication order [PDF]

open access: yes, 2016
We show in this paper that the Gentry-Szydlo algorithm for cyclotomic orders, previously revisited by Lenstra-Silverberg, can be extended to complex-multiplication (CM) orders, and even to a more general structure.
Kirchner, Paul
core   +1 more source

Decrypting NTRU: An Introductory Mathematical Exploration of the NTRU Public Key Cryptosystem

open access: yes, 2023
Provides an introductory analysis of the NTRU public key cryptosystem, including the mathematical background in which the system takes place, the specific workings of the system and how to break it, and a comparison to other relevant systems.
openaire   +2 more sources

NTRU kriptosistemi

open access: yes, 2020
Kafes problemlerinin zorluğu açık anahtar kriptografisine yeni bir aday eklemiştir. Bu konuda, Ajtai-Dwork, GGH ve NTRU gibi birçok kriptosistem geliştirilmiştir. NTRU'nun anahtar üretimi, şifreleme ve deşifreleme işlemlerinin daha hızlı olması ve anahtar boyunun daha küçük olması nedeniyle en çok ilgi gören kafes tabanlı kriptosistemdir ...
openaire   +1 more source

EPN:encryption padding for NTRU with provable security

open access: yesTongxin xuebao, 2008
Known as the fastest public key cryptosystem available now,the provable security of NTRU has not been solved well.an encryption padding,called EPN was designed,for NTRU.Under the full domain one wayness assumption of NTRU,EPN had been proved ...
MU Ning-bo, HU Yu-pu, WANG Bao-cang
doaj   +2 more sources

Security Authentication Protocol for Underwater Sensor Networks Based on NTRU

open access: yesJournal of Marine Science and Engineering
Underwater Wireless Sensor Networks (UWSNs) have a wide range of applications, where issues related to data authentication and communication are critical for enhancing underwater resource utilization and ensuring secure data transmission.
Fan Jiang, Ming Xu
doaj   +1 more source

Home - About - Disclaimer - Privacy