Results 171 to 180 of about 4,957 (182)
Some of the next articles are maybe not open access.
2017
Cold boot attacks target memory remanence effects in hardware to secret key material. Such attacks were first explored in the scientific literature by Halderman et al. (USENIX Security Symposium 2008) and, since then, different attacks have been developed against a range of asymmetric key and symmetric key algorithms. Such attacks in general receive as
Kenneth G. Paterson +1 more
openaire +1 more source
Cold boot attacks target memory remanence effects in hardware to secret key material. Such attacks were first explored in the scientific literature by Halderman et al. (USENIX Security Symposium 2008) and, since then, different attacks have been developed against a range of asymmetric key and symmetric key algorithms. Such attacks in general receive as
Kenneth G. Paterson +1 more
openaire +1 more source
A comparative analysis between NTRU and its some NTRU-Like cryptosystems
AIP Conference Proceedings, 2023Hassan Rashed Yassein +1 more
openaire +1 more source
2010
Danas korišteni asimetrični kriptosustavi se temelje na teškoći problema faktorizacije i diskretnog logaritma. S dolaskom kvantnih računala ti problemi će postati rješivi. Novi kandidati za teške probleme su problemi rešetki. NTRU je jedan od novijih kriptosustava koji se temelji na rešetkama.
openaire +1 more source
Danas korišteni asimetrični kriptosustavi se temelje na teškoći problema faktorizacije i diskretnog logaritma. S dolaskom kvantnih računala ti problemi će postati rješivi. Novi kandidati za teške probleme su problemi rešetki. NTRU je jedan od novijih kriptosustava koji se temelji na rešetkama.
openaire +1 more source
Cryptanalysis on “NTRU+: Compact Construction of NTRU Using Simple Encoding Method”
IEEE Transactions on Information Forensics and SecurityJoohee Lee +3 more
openaire +1 more source
Kryptosystém NTRU a jeho varianty
2016The theses firstly introduces the basics of lattice problems. Then it focuses on various aspects of the cryptosystem NTRU which is based on the mentioned problems. The system is then compared with the most common encryption methods used nowadays. Its supposed quantum resistence is mentioned briefly.
openaire +1 more source

