Results 91 to 100 of about 4,957 (182)
On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption
Lattice‐based encryption schemes are significant cryptographic primitives to defend information security against quantum menace, and the decryption failure rate is related to both theoretical and realistic security. We quantitatively analyze how the floating‐point arithmetic and neglecting small probabilities impact the precision, and propose a new ...
Lin Wang +3 more
wiley +1 more source
Using quantum key distribution for cryptographic purposes: a survey
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone
, +23 more
core +3 more sources
A Post-Quantum Secure RFID Authentication Protocol Based on NTRU Encryption Algorithm
As a non-contact identification technology, RFID (Radio Frequency Identification) is widely used in various Internet of Things applications. However, RFID systems are highly vulnerable to diverse attacks due to the openness of communication links between
Hu Liu +3 more
doaj +1 more source
Innovative Ways to Resolution of Native Title in Australia: Promoting Secure Futures on Pastoral Country [PDF]
Negotiated agreements between traditional owners and pastoralists about use and management of lands held under pastoral lease tenures in the arid and semi-arid rangelands of Australia will promote secure futures for both parties.
Agius, Parry +2 more
core +1 more source
Most of today’s public key cryptosystems are based on two hard mathematical problems: factoring large integers and discrete logarithm problem. With possible advent of quantum computers, these problems can become solvable. This paper describes the NTRU cryptosystem, cryptosystem that is known to not be vulnerable to quantum computer based attacks.
openaire +1 more source
Algorithms on Ideal over Complex Multiplication order [PDF]
We show in this paper that the Gentry-Szydlo algorithm for cyclotomic orders, previously revisited by Lenstra-Silverberg, can be extended to complex-multiplication (CM) orders, and even to a more general structure.
Kirchner, Paul
core +1 more source
Decrypting NTRU: An Introductory Mathematical Exploration of the NTRU Public Key Cryptosystem
Provides an introductory analysis of the NTRU public key cryptosystem, including the mathematical background in which the system takes place, the specific workings of the system and how to break it, and a comparison to other relevant systems.
openaire +2 more sources
Kafes problemlerinin zorluğu açık anahtar kriptografisine yeni bir aday eklemiştir. Bu konuda, Ajtai-Dwork, GGH ve NTRU gibi birçok kriptosistem geliştirilmiştir. NTRU'nun anahtar üretimi, şifreleme ve deşifreleme işlemlerinin daha hızlı olması ve anahtar boyunun daha küçük olması nedeniyle en çok ilgi gören kafes tabanlı kriptosistemdir ...
openaire +1 more source
EPN:encryption padding for NTRU with provable security
Known as the fastest public key cryptosystem available now,the provable security of NTRU has not been solved well.an encryption padding,called EPN was designed,for NTRU.Under the full domain one wayness assumption of NTRU,EPN had been proved ...
MU Ning-bo, HU Yu-pu, WANG Bao-cang
doaj +2 more sources
Security Authentication Protocol for Underwater Sensor Networks Based on NTRU
Underwater Wireless Sensor Networks (UWSNs) have a wide range of applications, where issues related to data authentication and communication are critical for enhancing underwater resource utilization and ensuring secure data transmission.
Fan Jiang, Ming Xu
doaj +1 more source

