Results 31 to 40 of about 4,957 (182)
Accelerating LTV based homomorphic encryption in reconfigurable hardware [PDF]
After being introduced in 2009, the first fully homomorphic encryption (FHE) scheme has created significant excitement in academia and industry. Despite rapid advances in the last 6 years, FHE schemes are still not ready for deployment due to an ...
Doroz, Yarkin +6 more
core +1 more source
Multi‐key fully homomorphic encryption (MKFHE) allows computations on ciphertexts encrypted by different users, which can be applied to implement secure multi‐party computing (MPC).
TanPing Zhou +5 more
doaj +1 more source
A Blind Digital Signature Protocol over NTRU [PDF]
Actually, the NIST post-quantum cryptosystem standardization competition reached its third round with seven finalist candidates. And NIST invites the cryptographic community to analyzing the selected candidates. In this context, we contribute by creating
Laaji El Hassane, Azizi Abdelmalek
doaj +1 more source
Distribution of Inverses in Polynomial Rings [PDF]
NOTICE: this is the author's version of a work that was accepted for publication in Indagationes Mathematicae. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control ...
Banks, William David, 1964- +1 more
core +1 more source
On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL [PDF]
We present novel variants of the dual-lattice attack against LWE in the presence of an unusually short secret. These variants are informed by recent progress in BKW-style algorithms for solving LWE.
Albrecht, Martin
core +4 more sources
A Non-commutative Cryptosystem Based on Quaternion Algebras
We propose BQTRU, a non-commutative NTRU-like cryptosystem over quaternion algebras. This cryptosystem uses bivariate polynomials as the underling ring.
Bagheri, Khadijeh +2 more
core +1 more source
Hagedorn divergences and tachyon potential [PDF]
We consider the critical behavior for a string theory near the Hagedorn temperature. We use the factorization of the worldsheet to isolate the Hagedorn divergences at all genera. We show that the Hagedorn divergences can be resummed by introducing double
A.A. Belavin +27 more
core +2 more sources
Study on the parameters of the matrix NTRU cryptosystem
With the rapid development of quantum computers, post-quantum cryptography has emerged as a prominent area of research in cryptography.ObjectivesIn order to avoid the decryption failure in matrix NTRU as NTRU, the Matrix NTRU algorithm was optimized ...
LI Zichen +3 more
doaj +1 more source
Security Vulnerabilities of Four Signature Schemes From NTRU Lattices and Pairings
Certificateless cryptography solves the certificate management problem in public-key cryptography and the key-escrow problem in identity-based cryptography. Xie et al. proposed a certificateless signature scheme using NTRU lattices.
Kyung-Ah Shim
doaj +1 more source
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas +3 more
core +1 more source

