Results 21 to 30 of about 4,957 (182)
A framework for cryptographic problems from linear algebra
We introduce a general framework encompassing the main hard problems emerging in lattice-based cryptography, which naturally includes the recently proposed Mersenne prime cryptosystem, but also problems coming from code-based cryptography.
Bootland Carl +3 more
doaj +1 more source
CQTRU: A Commutative Quaternions Rings Based Public Key Cryptosystem [PDF]
In this paper, we propose a new version of the NTRU public key cryptosystem called CQTRU. It is a four-dimensional cryptosystem based on the commutative quaternion ring.
Nadia M.G. Alsaidi +2 more
doaj +1 more source
Optimizing Hardware Resource Utilization for Accelerating the NTRU-KEM Algorithm
This paper focuses on enhancing the performance of the Nth-degree truncated-polynomial ring units key encapsulation mechanism (NTRU-KEM) algorithm, which ensures post-quantum resistance in the field of key establishment cryptography.
Yongseok Lee +4 more
doaj +1 more source
Single Trace Side Channel Analysis on NTRU Implementation
As researches on the quantum computer have progressed immensely, interests in post-quantum cryptography have greatly increased. NTRU is one of the well-known algorithms due to its practical key sizes and fast performance along with the resistance against
Soojung An +4 more
doaj +1 more source
In this paper NTRUEncrypt is implemented for the first time on a GPU using the CUDA platform. As is shown, this operation lends itself perfectly for parallelization and performs extremely well compared to similar security levels for ECC and RSA giving speedups of around three to five orders of magnitude.
Hermans, Jens +2 more
openaire +2 more sources
A Group-Based NTRU-Like Public-Key Cryptosystem for IoT
The Internet of things have been widely used to improve our daily life. Public-key cryptosystem plays a central role in the security of IoT. However, classic public-key cryptosystems such as RSA and ECC are not suitable for IoT because of the complicated
Li Shuai +3 more
doaj +1 more source
Reversible Data Hiding Scheme in NTRU Encrypted Domain Based on Polynomial Partition [PDF]
With the rapid development of cloud computing techniques and demand of privacy preservation,reversible data hiding(RDH) in homomorphic encrypted domain has become a hot research topic.Most of the existing RDH schemes in encrypted domain exploit ...
LIU Dingcai, WU Haotian, ZHUANG Zhenwei, HE Junhui
doaj +1 more source
Privacy-aware multi-context RFID infrastructure using public key cryptography [PDF]
We propose a novel RFID infrastructure design, which foresees the usage of a single RFID tag within different contexts and for multiple purposes.
A. Juels +8 more
core +1 more source
A Subfield Lattice Attack on Overstretched NTRU Assumptions:Cryptanalysis of Some FHE and Graded Encoding Schemes [PDF]
International ...
A Ferraguti +37 more
core +5 more sources
Antrag: Annular NTRU Trapdoor Generation
In this paper, we introduce a novel trapdoor generation technique for Prest’s hybrid sampler over NTRU lattices. Prest’s sampler is used in particular in the recently proposed Mitaka signature scheme (Eurocrypt 2022), a variant of the Falcon signature scheme, one of the candidates selected by NIST for standardization.
Thomas Espitau +4 more
openaire +2 more sources

