Results 101 to 110 of about 4,998 (181)
Identity-Based Proxy Signature with Message Recovery over NTRU Lattice. [PDF]
Wu F, Zhou B, Zhang X.
europepmc +1 more source
Pathways to the co-management of protected areas and native title in Australia [PDF]
In recent decades, various forms of co-management of national parks and other protected areas by governments and Indigenous people have come to the fore.
Chris Haynes +2 more
core
Calculation of complexity of NTRU and optimized NTRU using GA, ACO, and PSO algorithm
AbstractA great security of information for the eābusiness applications is required. In such applications, use of cryptographic methods is very necessary. The two popularly used cryptographic methods are secret key cryptosystem and public key cryptosystem. Data encryption standard is the most popular secret key cryptosystem.
Himani Agrawal, Monisha Sharma
openaire +1 more source
Security Analysis of DBTRU Cryptosystem. [PDF]
Tong X, Bi J, Duan Y, Li L, Wang L.
europepmc +1 more source
Post quantum blockchain architecture for internet of things over NTRU lattice. [PDF]
Yuan B, Wu F, Zheng Z.
europepmc +1 more source
Integrated NTT-Karatsuba for fast multiplication of NTRU Algorithm
The increasing threat of attacks from quantum computers requires the development of more efficient and secure post-quantum cryptographic algorithms, one of which is NTRU.
Muhammad Fathan Rivaldi +2 more
doaj +1 more source
The emergence of large-scale quantum computers threatens the long-term security of classical public-key cryptosystems, making the integration of post-quantum cryptography (PQC) essential for resource-constrained embedded and IoT platforms.
Tri-Duc Ta +3 more
doaj +1 more source
Efficient Linkable Ring Signature Scheme over NTRU Lattice with Unconditional Anonymity. [PDF]
Ye Q, Wang M, Meng H, Xia F, Yan X.
europepmc +1 more source
Agricultural Cold Chain Logistics Mode Based on Multi-Mode Blockchain Data Model. [PDF]
Si Y.
europepmc +1 more source

