Results 1 to 10 of about 1,784 (149)

NTRU-Like Random Congruential Public-Key Cryptosystem for Wireless Sensor Networks [PDF]

open access: yesSensors, 2020
Wireless sensor networks (WSNs) are the core of the Internet of Things and require cryptographic protection. Cryptographic methods for WSN should be fast and consume low power as these networks rely on battery-powered devices and microcontrollers.
Anas Ibrahim   +5 more
doaj   +5 more sources

Security Analysis of DBTRU Cryptosystem [PDF]

open access: yesEntropy, 2022
DBTRU was proposed by Thang and Binh in 2015. As a variant of NTRU, the integer polynomial ring is replaced by two binary truncated polynomial rings GF(2)[x]/(xn+1). DBTRU has some advantages over NTRU in terms of security and performance. In this paper,
Xiaofei Tong   +4 more
doaj   +2 more sources

Good Gottesman-Kitaev-Preskill codes from the NTRU cryptosystem [PDF]

open access: yesQuantum
We introduce a new class of random Gottesman-Kitaev-Preskill (GKP) codes derived from the cryptanalysis of the so-called NTRU cryptosystem. The derived codes are $good$ in that they exhibit constant rate and average distance scaling $\Delta \propto \sqrt{
Jonathan Conrad   +2 more
doaj   +5 more sources

A Group-Based NTRU-Like Public-Key Cryptosystem for IoT [PDF]

open access: yesIEEE Access, 2019
The Internet of things have been widely used to improve our daily life. Public-key cryptosystem plays a central role in the security of IoT. However, classic public-key cryptosystems such as RSA and ECC are not suitable for IoT because of the complicated
Li Shuai   +3 more
doaj   +2 more sources

Secure computation protocol of Chebyshev distance under the malicious model [PDF]

open access: yesScientific Reports
Secure multi-party computation of Chebyshev distance represents a crucial method for confidential distance measurement, holding significant theoretical and practical implications.
Xin Liu   +7 more
doaj   +2 more sources

A random number generator based on NTRU cryptosystem [PDF]

open access: yesMaejo International Journal of Science and Technology, 2010
A random number generator based on the operation of the NTRU cryptosystem is proposed. By using the proposed generator together with the NTRU cryptosystem, we can save hardware and software components.
He Debiao
doaj   +1 more source

Study on the parameters of the matrix NTRU cryptosystem

open access: yes河南理工大学学报. 自然科学版
With the rapid development of quantum computers, post-quantum cryptography has emerged as a prominent area of research in cryptography.ObjectivesIn order to avoid the decryption failure in matrix NTRU as NTRU, the Matrix NTRU algorithm was optimized ...
LI Zichen   +3 more
doaj   +2 more sources

A Blind Digital Signature Protocol over NTRU [PDF]

open access: yesE3S Web of Conferences, 2022
Actually, the NIST post-quantum cryptosystem standardization competition reached its third round with seven finalist candidates. And NIST invites the cryptographic community to analyzing the selected candidates. In this context, we contribute by creating
Laaji El Hassane, Azizi Abdelmalek
doaj   +1 more source

Comparison of Security Performance of NTRU and ECC Algorithms For RFID Authentication [PDF]

open access: yesE3S Web of Conferences, 2023
The rapid development of the Internet of Things creates information security vulnerabilities due to the unavoidable process of exchanging data. One device that is vulnerable to data security is RFID.
Bambang Harjito   +1 more
doaj   +1 more source

Reversible Data Hiding Scheme in NTRU Encrypted Domain Based on Polynomial Partition [PDF]

open access: yesJisuanji kexue, 2023
With the rapid development of cloud computing techniques and demand of privacy preservation,reversible data hiding(RDH) in homomorphic encrypted domain has become a hot research topic.Most of the existing RDH schemes in encrypted domain exploit ...
LIU Dingcai, WU Haotian, ZHUANG Zhenwei, HE Junhui
doaj   +1 more source

Home - About - Disclaimer - Privacy