Results 61 to 70 of about 4,998 (181)

Good Gottesman-Kitaev-Preskill codes from the NTRU cryptosystem [PDF]

open access: yesQuantum
We introduce a new class of random Gottesman-Kitaev-Preskill (GKP) codes derived from the cryptanalysis of the so-called NTRU cryptosystem. The derived codes are $good$ in that they exhibit constant rate and average distance scaling $\Delta \propto \sqrt{
Jonathan Conrad   +2 more
doaj   +1 more source

Application of NTRU Cryptographic Algorithm for securing SCADA communication

open access: yes, 2013
Supervisory Control and Data Acquisition (SCADA) system is a control system which is widely used in Critical Infrastructure System to monitor and control industrial processes autonomously.
Puliadi Premnath, Amritha
core   +1 more source

Depth optimized efficient homomorphic sorting [PDF]

open access: yes, 2015
We introduce a sorting scheme which is capable of efficiently sorting encrypted data without the secret key. The technique is obtained by focusing on the multiplicative depth of the sorting circuit alongside the more traditional metrics such as number of
A Chatterjee   +8 more
core   +1 more source

A Privacy‐Preserving System for Confidential Carpooling Services Using Homomorphic Encryption

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 5, May 2025.
This research presents a homomorphic encryption‐based solution to enhance privacy in carpooling without compromising functionality. Rigorous experiments confirm its robustness, accuracy, and efficiency in securely matching users while preserving confidentiality.
David Palma   +3 more
wiley   +1 more source

Algebraic attack on NTRU using Witt vectors and Gröbner bases

open access: yesJournal of Mathematical Cryptology, 2009
We present an algebraic attack on NTRU (restricted to the case where the parameter q is a power of two) using the method of the Witt vectors proposed by Silverman, Smart and Vercauteren [Springer: 278–298, 2005]; the latter considered only the first two ...
Bourgeois Gérald, Faugère Jean-Charles
doaj   +1 more source

New practical algorithms for the approximate shortest lattice vector [PDF]

open access: yes, 2005
We present a practical algorithm that given an LLL-reduced lattice basis of dimension n, runs in time O(n3(k=6)k=4+n4) and approximates the length of the shortest, non-zero lattice vector to within a factor (k=6)n=(2k). This result is based on reasonable
Schnorr, Claus Peter
core  

Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This paper addresses the need for quantum‐safe blockchain solutions specifically for embedded systems by integrating Post‐Quantum Cryptography (PQC) into blockchain frameworks. We propose a quantum‐secure blockchain architecture using NIST‐standardized PQC algorithms, finding Falcon‐512 to be optimal for embedded environments due to its security and ...
Dominik Marchsreiter
wiley   +1 more source

Cybersecurity and Artificial Intelligence in Unmanned Aerial Vehicles: Emerging Challenges and Advanced Countermeasures

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The increasing adoption of artificial intelligence (AI)‐driven unmanned aerial vehicles (UAVs) in military, commercial, and surveillance operations has introduced significant security challenges, including cyber threats, adversarial AI attacks, and communication vulnerabilities. This paper presents a comprehensive review of the key security threats and
Deafallah Alsadie, Jiwei Tian
wiley   +1 more source

Proposal for Two Enhanced NTRU [PDF]

open access: yesInternational Journal of Advanced Computer Science and Applications, 2014
Sound is very widely used in communication. In order to ensure secure communication a cryptographic data scheme is used. Secure sound is needed in many fields such as military, business, banking and electronic commerce. There is also an increasing demand for secured sound in network communication.
Ahmed Tariq, Najlaa Mohammad, Suha Abdul
openaire   +1 more source

A Secure Access Framework for IoT–Cloud Integration With Blockchain and Bi‐GCN

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Digital advancements have made cloud computing and IoT essential for innovative environments such as healthcare and industry. Cloud platforms offer scalable compute and storage capabilities, whereas IoT devices generate real‐time data. However, there are significant challenges faced while integrating the IoT with cloud to achieve robust, scalable, and ...
Kavitha M. S.   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy