Results 81 to 90 of about 4,957 (182)
NTRU in Constrained Devices [PDF]
The growing connectivity offered by constrained computing devices signals a critical need for public-key cryptography in such environments. By their nature, however, public-key systems have been difficult to implement in systems with limited computational power.
Daniel V. Bailey +4 more
openaire +1 more source
QIoTChain: Quantum IoT‐blockchain fusion for advanced data protection in Industry 4.0
Data underpins modern society and the economy, enabling informed choices and innovation. Protecting data from tampering is crucial, leading to encryption using cryptography, blockchain, and zero trust models. Quantum computing advances aid post‐quantum security, yet adoption hurdles persist.
Aditya Kumar Sharma +3 more
wiley +1 more source
Single-Trace Attacks on Message Encoding in Lattice-Based KEMs
In this article, we propose single-trace side-channel attacks against lattice-based key encapsulation mechanisms (KEMs) that are the third-round candidates of the national institute of standards and technology (NIST) standardization project. Specifically,
Bo-Yeon Sim +8 more
doaj +1 more source
Application of NTRU Cryptographic Algorithm for securing SCADA communication
Supervisory Control and Data Acquisition (SCADA) system is a control system which is widely used in Critical Infrastructure System to monitor and control industrial processes autonomously.
Puliadi Premnath, Amritha
core +1 more source
Polynomial Multiplication in NTRU Prime
This paper proposes two different methods to perform NTT-based polynomial multiplication in polynomial rings that do not naturally support such a multiplication. We demonstrate these methods on the NTRU Prime key-encapsulation mechanism (KEM) proposed by Bernstein, Chuengsatiansup, Lange, and Vredendaal, which uses a polynomial ring that is, by design,
Erdem Alkim +10 more
openaire +3 more sources
LWE‐based verifiable essential secret image sharing scheme ((t,s,k,n)$( {t,s,k,n} )$ ‐ VESIS)
This article introduces a verifiable essential secret image sharing scheme based on LWEs that employs Bloom filters and hash functions for verification. In traditional schemes, shareholders have similar situations, but the proposed scheme is designed for scenarios where shareholders hold distinct positions, essential and non‐essential.
Massoud Hadian Dehkordi +2 more
wiley +1 more source
NTTRU: Truly Fast NTRU Using NTT
We present NTTRU – an IND-CCA2 secure NTRU-based key encapsulation scheme that uses the number theoretic transform (NTT) over the cyclotomic ring Z7681[X]/(X768−X384+1) and produces public keys and ciphertexts of approximately 1.25 KB at the 128-bit ...
Vadim Lyubashevsky, Gregor Seiler
doaj +1 more source
A survey on post‐quantum based approaches for edge computing security
The distribution of reviewed papers by focused area. Abstract With the development of technology and its integration with scientific realities, computer systems continue to evolve as infrastructure. One of the most important obstacles in front of quantum computers with high‐speed processing is that its existing systems cause security vulnerabilities ...
Aykut Karakaya, Ahmet Ulu
wiley +1 more source
A random number generator based on NTRU cryptosystem [PDF]
A random number generator based on the operation of the NTRU cryptosystem is proposed. By using the proposed generator together with the NTRU cryptosystem, we can save hardware and software components.
He Debiao
doaj
Generalisations of NTRU cryptosystem
AbstractSince the proposal of NTRU cryptosystem, many variants were proposed by the researcher using different‐different algebraic structure. In this article, we try to explore the existing variants of NTRU cryptosystem with their comparative study. Copyright © 2016 John Wiley & Sons, Ltd.
Sonika Singh, Sahadeo Padhye
openaire +1 more source

