Results 81 to 90 of about 4,957 (182)

NTRU in Constrained Devices [PDF]

open access: yes, 2001
The growing connectivity offered by constrained computing devices signals a critical need for public-key cryptography in such environments. By their nature, however, public-key systems have been difficult to implement in systems with limited computational power.
Daniel V. Bailey   +4 more
openaire   +1 more source

QIoTChain: Quantum IoT‐blockchain fusion for advanced data protection in Industry 4.0

open access: yesIET Blockchain, Volume 4, Issue 3, Page 252-262, September 2024.
Data underpins modern society and the economy, enabling informed choices and innovation. Protecting data from tampering is crucial, leading to encryption using cryptography, blockchain, and zero trust models. Quantum computing advances aid post‐quantum security, yet adoption hurdles persist.
Aditya Kumar Sharma   +3 more
wiley   +1 more source

Single-Trace Attacks on Message Encoding in Lattice-Based KEMs

open access: yesIEEE Access, 2020
In this article, we propose single-trace side-channel attacks against lattice-based key encapsulation mechanisms (KEMs) that are the third-round candidates of the national institute of standards and technology (NIST) standardization project. Specifically,
Bo-Yeon Sim   +8 more
doaj   +1 more source

Application of NTRU Cryptographic Algorithm for securing SCADA communication

open access: yes, 2013
Supervisory Control and Data Acquisition (SCADA) system is a control system which is widely used in Critical Infrastructure System to monitor and control industrial processes autonomously.
Puliadi Premnath, Amritha
core   +1 more source

Polynomial Multiplication in NTRU Prime

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
This paper proposes two different methods to perform NTT-based polynomial multiplication in polynomial rings that do not naturally support such a multiplication. We demonstrate these methods on the NTRU Prime key-encapsulation mechanism (KEM) proposed by Bernstein, Chuengsatiansup, Lange, and Vredendaal, which uses a polynomial ring that is, by design,
Erdem Alkim   +10 more
openaire   +3 more sources

LWE‐based verifiable essential secret image sharing scheme ((t,s,k,n)$( {t,s,k,n} )$ ‐ VESIS)

open access: yesIET Image Processing, Volume 18, Issue 4, Page 1053-1072, 27 March 2024.
This article introduces a verifiable essential secret image sharing scheme based on LWEs that employs Bloom filters and hash functions for verification. In traditional schemes, shareholders have similar situations, but the proposed scheme is designed for scenarios where shareholders hold distinct positions, essential and non‐essential.
Massoud Hadian Dehkordi   +2 more
wiley   +1 more source

NTTRU: Truly Fast NTRU Using NTT

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
We present NTTRU – an IND-CCA2 secure NTRU-based key encapsulation scheme that uses the number theoretic transform (NTT) over the cyclotomic ring Z7681[X]/(X768−X384+1) and produces public keys and ciphertexts of approximately 1.25 KB at the 128-bit ...
Vadim Lyubashevsky, Gregor Seiler
doaj   +1 more source

A survey on post‐quantum based approaches for edge computing security

open access: yesWIREs Computational Statistics, Volume 16, Issue 1, January/February 2024.
The distribution of reviewed papers by focused area. Abstract With the development of technology and its integration with scientific realities, computer systems continue to evolve as infrastructure. One of the most important obstacles in front of quantum computers with high‐speed processing is that its existing systems cause security vulnerabilities ...
Aykut Karakaya, Ahmet Ulu
wiley   +1 more source

A random number generator based on NTRU cryptosystem [PDF]

open access: yesMaejo International Journal of Science and Technology, 2010
A random number generator based on the operation of the NTRU cryptosystem is proposed. By using the proposed generator together with the NTRU cryptosystem, we can save hardware and software components.
He Debiao
doaj  

Generalisations of NTRU cryptosystem

open access: yesSecurity and Communication Networks, 2016
AbstractSince the proposal of NTRU cryptosystem, many variants were proposed by the researcher using different‐different algebraic structure. In this article, we try to explore the existing variants of NTRU cryptosystem with their comparative study. Copyright © 2016 John Wiley & Sons, Ltd.
Sonika Singh, Sahadeo Padhye
openaire   +1 more source

Home - About - Disclaimer - Privacy