Results 1 to 10 of about 1,784 (149)
NTRU-Like Random Congruential Public-Key Cryptosystem for Wireless Sensor Networks [PDF]
Wireless sensor networks (WSNs) are the core of the Internet of Things and require cryptographic protection. Cryptographic methods for WSN should be fast and consume low power as these networks rely on battery-powered devices and microcontrollers.
Anas Ibrahim +5 more
doaj +5 more sources
Security Analysis of DBTRU Cryptosystem [PDF]
DBTRU was proposed by Thang and Binh in 2015. As a variant of NTRU, the integer polynomial ring is replaced by two binary truncated polynomial rings GF(2)[x]/(xn+1). DBTRU has some advantages over NTRU in terms of security and performance. In this paper,
Xiaofei Tong +4 more
doaj +2 more sources
Good Gottesman-Kitaev-Preskill codes from the NTRU cryptosystem [PDF]
We introduce a new class of random Gottesman-Kitaev-Preskill (GKP) codes derived from the cryptanalysis of the so-called NTRU cryptosystem. The derived codes are $good$ in that they exhibit constant rate and average distance scaling $\Delta \propto \sqrt{
Jonathan Conrad +2 more
doaj +5 more sources
A Group-Based NTRU-Like Public-Key Cryptosystem for IoT [PDF]
The Internet of things have been widely used to improve our daily life. Public-key cryptosystem plays a central role in the security of IoT. However, classic public-key cryptosystems such as RSA and ECC are not suitable for IoT because of the complicated
Li Shuai +3 more
doaj +2 more sources
Secure computation protocol of Chebyshev distance under the malicious model [PDF]
Secure multi-party computation of Chebyshev distance represents a crucial method for confidential distance measurement, holding significant theoretical and practical implications.
Xin Liu +7 more
doaj +2 more sources
A random number generator based on NTRU cryptosystem [PDF]
A random number generator based on the operation of the NTRU cryptosystem is proposed. By using the proposed generator together with the NTRU cryptosystem, we can save hardware and software components.
He Debiao
doaj +1 more source
Study on the parameters of the matrix NTRU cryptosystem
With the rapid development of quantum computers, post-quantum cryptography has emerged as a prominent area of research in cryptography.ObjectivesIn order to avoid the decryption failure in matrix NTRU as NTRU, the Matrix NTRU algorithm was optimized ...
LI Zichen +3 more
doaj +2 more sources
A Blind Digital Signature Protocol over NTRU [PDF]
Actually, the NIST post-quantum cryptosystem standardization competition reached its third round with seven finalist candidates. And NIST invites the cryptographic community to analyzing the selected candidates. In this context, we contribute by creating
Laaji El Hassane, Azizi Abdelmalek
doaj +1 more source
Comparison of Security Performance of NTRU and ECC Algorithms For RFID Authentication [PDF]
The rapid development of the Internet of Things creates information security vulnerabilities due to the unavoidable process of exchanging data. One device that is vulnerable to data security is RFID.
Bambang Harjito +1 more
doaj +1 more source
Reversible Data Hiding Scheme in NTRU Encrypted Domain Based on Polynomial Partition [PDF]
With the rapid development of cloud computing techniques and demand of privacy preservation,reversible data hiding(RDH) in homomorphic encrypted domain has become a hot research topic.Most of the existing RDH schemes in encrypted domain exploit ...
LIU Dingcai, WU Haotian, ZHUANG Zhenwei, HE Junhui
doaj +1 more source

