Results 41 to 50 of about 4,998 (181)
Ring Learning With Errors: A crossroads between postquantum cryptography, machine learning and number theory [PDF]
The present survey reports on the state of the art of the different cryptographic functionalities built upon the ring learning with errors problem and its interplay with several classical problems in algebraic number theory.
Chacón, Iván Blanco
core +2 more sources
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas +3 more
core +1 more source
Hagedorn divergences and tachyon potential [PDF]
We consider the critical behavior for a string theory near the Hagedorn temperature. We use the factorization of the worldsheet to isolate the Hagedorn divergences at all genera. We show that the Hagedorn divergences can be resummed by introducing double
A.A. Belavin +27 more
core +2 more sources
Study on the parameters of the matrix NTRU cryptosystem
With the rapid development of quantum computers, post-quantum cryptography has emerged as a prominent area of research in cryptography.ObjectivesIn order to avoid the decryption failure in matrix NTRU as NTRU, the Matrix NTRU algorithm was optimized ...
LI Zichen +3 more
doaj +1 more source
Security considerations for Galois non-dual RLWE families [PDF]
We explore further the hardness of the non-dual discrete variant of the Ring-LWE problem for various number rings, give improved attacks for certain rings satisfying some additional assumptions, construct a new family of vulnerable Galois number fields ...
D Micciancio +13 more
core +2 more sources
Security Vulnerabilities of Four Signature Schemes From NTRU Lattices and Pairings
Certificateless cryptography solves the certificate management problem in public-key cryptography and the key-escrow problem in identity-based cryptography. Xie et al. proposed a certificateless signature scheme using NTRU lattices.
Kyung-Ah Shim
doaj +1 more source
A Non-commutative Cryptosystem Based on Quaternion Algebras
We propose BQTRU, a non-commutative NTRU-like cryptosystem over quaternion algebras. This cryptosystem uses bivariate polynomials as the underling ring.
Bagheri, Khadijeh +2 more
core +1 more source
Privacy-aware multi-context RFID infrastructure using public key cryptography [PDF]
We propose a novel RFID infrastructure design, which foresees the usage of a single RFID tag within different contexts and for multiple purposes.
A. Juels +8 more
core +1 more source
An NTRU-like Message Recoverable Signature Algorithm
An important feature of Nyberg-Rueppel type digital signature algorithms is message recovery, this signature algorithm can recover the original information from the signature directly by the verifier in the verification phase after signing the message ...
Tingle Shen, Li Miao, Bin Hua, Shuai Li
doaj +1 more source
Towards Faster Cryptosystems, II [PDF]
http://www.math.missouri.edu/~bbanks/papers/index.htmlWe discuss three cryptosystems, NTRU, SPIFI , and ENROOT, that are based on the use of polynomials with restricted ...
Banks, William David, 1964-
core +1 more source

