Results 41 to 50 of about 4,998 (181)

Ring Learning With Errors: A crossroads between postquantum cryptography, machine learning and number theory [PDF]

open access: yes, 2020
The present survey reports on the state of the art of the different cryptographic functionalities built upon the ring learning with errors problem and its interplay with several classical problems in algebraic number theory.
Chacón, Iván Blanco
core   +2 more sources

A Survey on Homomorphic Encryption Schemes: Theory and Implementation

open access: yes, 2017
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas   +3 more
core   +1 more source

Hagedorn divergences and tachyon potential [PDF]

open access: yes, 2007
We consider the critical behavior for a string theory near the Hagedorn temperature. We use the factorization of the worldsheet to isolate the Hagedorn divergences at all genera. We show that the Hagedorn divergences can be resummed by introducing double
A.A. Belavin   +27 more
core   +2 more sources

Study on the parameters of the matrix NTRU cryptosystem

open access: yes河南理工大学学报. 自然科学版
With the rapid development of quantum computers, post-quantum cryptography has emerged as a prominent area of research in cryptography.ObjectivesIn order to avoid the decryption failure in matrix NTRU as NTRU, the Matrix NTRU algorithm was optimized ...
LI Zichen   +3 more
doaj   +1 more source

Security considerations for Galois non-dual RLWE families [PDF]

open access: yes, 2017
We explore further the hardness of the non-dual discrete variant of the Ring-LWE problem for various number rings, give improved attacks for certain rings satisfying some additional assumptions, construct a new family of vulnerable Galois number fields ...
D Micciancio   +13 more
core   +2 more sources

Security Vulnerabilities of Four Signature Schemes From NTRU Lattices and Pairings

open access: yesIEEE Access, 2020
Certificateless cryptography solves the certificate management problem in public-key cryptography and the key-escrow problem in identity-based cryptography. Xie et al. proposed a certificateless signature scheme using NTRU lattices.
Kyung-Ah Shim
doaj   +1 more source

A Non-commutative Cryptosystem Based on Quaternion Algebras

open access: yes, 2017
We propose BQTRU, a non-commutative NTRU-like cryptosystem over quaternion algebras. This cryptosystem uses bivariate polynomials as the underling ring.
Bagheri, Khadijeh   +2 more
core   +1 more source

Privacy-aware multi-context RFID infrastructure using public key cryptography [PDF]

open access: yes, 2007
We propose a novel RFID infrastructure design, which foresees the usage of a single RFID tag within different contexts and for multiple purposes.
A. Juels   +8 more
core   +1 more source

An NTRU-like Message Recoverable Signature Algorithm

open access: yesMathematics
An important feature of Nyberg-Rueppel type digital signature algorithms is message recovery, this signature algorithm can recover the original information from the signature directly by the verifier in the verification phase after signing the message ...
Tingle Shen, Li Miao, Bin Hua, Shuai Li
doaj   +1 more source

Towards Faster Cryptosystems, II [PDF]

open access: yes, 2005
http://www.math.missouri.edu/~bbanks/papers/index.htmlWe discuss three cryptosystems, NTRU, SPIFI , and ENROOT, that are based on the use of polynomials with restricted ...
Banks, William David, 1964-
core   +1 more source

Home - About - Disclaimer - Privacy