Results 31 to 40 of about 4,998 (181)
CQTRU: A Commutative Quaternions Rings Based Public Key Cryptosystem [PDF]
In this paper, we propose a new version of the NTRU public key cryptosystem called CQTRU. It is a four-dimensional cryptosystem based on the commutative quaternion ring.
Nadia M.G. Alsaidi +2 more
doaj +1 more source
Optimizing Hardware Resource Utilization for Accelerating the NTRU-KEM Algorithm
This paper focuses on enhancing the performance of the Nth-degree truncated-polynomial ring units key encapsulation mechanism (NTRU-KEM) algorithm, which ensures post-quantum resistance in the field of key establishment cryptography.
Yongseok Lee +4 more
doaj +1 more source
In this paper NTRUEncrypt is implemented for the first time on a GPU using the CUDA platform. As is shown, this operation lends itself perfectly for parallelization and performs extremely well compared to similar security levels for ECC and RSA giving speedups of around three to five orders of magnitude.
Hermans, Jens +2 more
openaire +2 more sources
Single Trace Side Channel Analysis on NTRU Implementation
As researches on the quantum computer have progressed immensely, interests in post-quantum cryptography have greatly increased. NTRU is one of the well-known algorithms due to its practical key sizes and fast performance along with the resistance against
Soojung An +4 more
doaj +1 more source
A Group-Based NTRU-Like Public-Key Cryptosystem for IoT
The Internet of things have been widely used to improve our daily life. Public-key cryptosystem plays a central role in the security of IoT. However, classic public-key cryptosystems such as RSA and ECC are not suitable for IoT because of the complicated
Li Shuai +3 more
doaj +1 more source
Reversible Data Hiding Scheme in NTRU Encrypted Domain Based on Polynomial Partition [PDF]
With the rapid development of cloud computing techniques and demand of privacy preservation,reversible data hiding(RDH) in homomorphic encrypted domain has become a hot research topic.Most of the existing RDH schemes in encrypted domain exploit ...
LIU Dingcai, WU Haotian, ZHUANG Zhenwei, HE Junhui
doaj +1 more source
Antrag: Annular NTRU Trapdoor Generation
In this paper, we introduce a novel trapdoor generation technique for Prest’s hybrid sampler over NTRU lattices. Prest’s sampler is used in particular in the recently proposed Mitaka signature scheme (Eurocrypt 2022), a variant of the Falcon signature scheme, one of the candidates selected by NIST for standardization.
Thomas Espitau +4 more
openaire +2 more sources
A Subfield Lattice Attack on Overstretched NTRU Assumptions:Cryptanalysis of Some FHE and Graded Encoding Schemes [PDF]
International ...
A Ferraguti +37 more
core +5 more sources
Accelerating LTV based homomorphic encryption in reconfigurable hardware [PDF]
After being introduced in 2009, the first fully homomorphic encryption (FHE) scheme has created significant excitement in academia and industry. Despite rapid advances in the last 6 years, FHE schemes are still not ready for deployment due to an ...
Doroz, Yarkin +6 more
core +1 more source
Multi‐key fully homomorphic encryption (MKFHE) allows computations on ciphertexts encrypted by different users, which can be applied to implement secure multi‐party computing (MPC).
TanPing Zhou +5 more
doaj +1 more source

