Results 171 to 180 of about 4,957 (182)
Some of the next articles are maybe not open access.

NTRU

2011
William Whyte, Jeff Hoffstein
openaire   +2 more sources

Cold Boot Attacks on NTRU

2017
Cold boot attacks target memory remanence effects in hardware to secret key material. Such attacks were first explored in the scientific literature by Halderman et al. (USENIX Security Symposium 2008) and, since then, different attacks have been developed against a range of asymmetric key and symmetric key algorithms. Such attacks in general receive as
Kenneth G. Paterson   +1 more
openaire   +1 more source

A comparative analysis between NTRU and its some NTRU-Like cryptosystems

AIP Conference Proceedings, 2023
Hassan Rashed Yassein   +1 more
openaire   +1 more source

Asimetrični kriptosustav NTRU

2010
Danas korišteni asimetrični kriptosustavi se temelje na teškoći problema faktorizacije i diskretnog logaritma. S dolaskom kvantnih računala ti problemi će postati rješivi. Novi kandidati za teške probleme su problemi rešetki. NTRU je jedan od novijih kriptosustava koji se temelji na rešetkama.
openaire   +1 more source

Optimizations for NTRU

2012
Jeffrey Hoffstein, Joseph Silverman
openaire   +1 more source

Lattice-Based Cryptography and NTRU

2022
Stefania Loredana Nita   +1 more
openaire   +1 more source

Cryptanalysis on “NTRU+: Compact Construction of NTRU Using Simple Encoding Method”

IEEE Transactions on Information Forensics and Security
Joohee Lee   +3 more
openaire   +1 more source

Kryptosystém NTRU a jeho varianty

2016
The theses firstly introduces the basics of lattice problems. Then it focuses on various aspects of the cryptosystem NTRU which is based on the mentioned problems. The system is then compared with the most common encryption methods used nowadays. Its supposed quantum resistence is mentioned briefly.
openaire   +1 more source

Home - About - Disclaimer - Privacy