Results 21 to 30 of about 4,957 (182)

A framework for cryptographic problems from linear algebra

open access: yesJournal of Mathematical Cryptology, 2020
We introduce a general framework encompassing the main hard problems emerging in lattice-based cryptography, which naturally includes the recently proposed Mersenne prime cryptosystem, but also problems coming from code-based cryptography.
Bootland Carl   +3 more
doaj   +1 more source

CQTRU: A Commutative Quaternions Rings Based Public Key Cryptosystem [PDF]

open access: yesEngineering and Technology Journal, 2016
In this paper, we propose a new version of the NTRU public key cryptosystem called CQTRU. It is a four-dimensional cryptosystem based on the commutative quaternion ring.
Nadia M.G. Alsaidi   +2 more
doaj   +1 more source

Optimizing Hardware Resource Utilization for Accelerating the NTRU-KEM Algorithm

open access: yesComputers, 2023
This paper focuses on enhancing the performance of the Nth-degree truncated-polynomial ring units key encapsulation mechanism (NTRU-KEM) algorithm, which ensures post-quantum resistance in the field of key establishment cryptography.
Yongseok Lee   +4 more
doaj   +1 more source

Single Trace Side Channel Analysis on NTRU Implementation

open access: yesApplied Sciences, 2018
As researches on the quantum computer have progressed immensely, interests in post-quantum cryptography have greatly increased. NTRU is one of the well-known algorithms due to its practical key sizes and fast performance along with the resistance against
Soojung An   +4 more
doaj   +1 more source

Speed Records for NTRU [PDF]

open access: yes, 2010
In this paper NTRUEncrypt is implemented for the first time on a GPU using the CUDA platform. As is shown, this operation lends itself perfectly for parallelization and performs extremely well compared to similar security levels for ECC and RSA giving speedups of around three to five orders of magnitude.
Hermans, Jens   +2 more
openaire   +2 more sources

A Group-Based NTRU-Like Public-Key Cryptosystem for IoT

open access: yesIEEE Access, 2019
The Internet of things have been widely used to improve our daily life. Public-key cryptosystem plays a central role in the security of IoT. However, classic public-key cryptosystems such as RSA and ECC are not suitable for IoT because of the complicated
Li Shuai   +3 more
doaj   +1 more source

Reversible Data Hiding Scheme in NTRU Encrypted Domain Based on Polynomial Partition [PDF]

open access: yesJisuanji kexue, 2023
With the rapid development of cloud computing techniques and demand of privacy preservation,reversible data hiding(RDH) in homomorphic encrypted domain has become a hot research topic.Most of the existing RDH schemes in encrypted domain exploit ...
LIU Dingcai, WU Haotian, ZHUANG Zhenwei, HE Junhui
doaj   +1 more source

Privacy-aware multi-context RFID infrastructure using public key cryptography [PDF]

open access: yes, 2007
We propose a novel RFID infrastructure design, which foresees the usage of a single RFID tag within different contexts and for multiple purposes.
A. Juels   +8 more
core   +1 more source

A Subfield Lattice Attack on Overstretched NTRU Assumptions:Cryptanalysis of Some FHE and Graded Encoding Schemes [PDF]

open access: yes, 2016
International ...
A Ferraguti   +37 more
core   +5 more sources

Antrag: Annular NTRU Trapdoor Generation

open access: yes, 2023
In this paper, we introduce a novel trapdoor generation technique for Prest’s hybrid sampler over NTRU lattices. Prest’s sampler is used in particular in the recently proposed Mitaka signature scheme (Eurocrypt 2022), a variant of the Falcon signature scheme, one of the candidates selected by NIST for standardization.
Thomas Espitau   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy