Results 111 to 120 of about 175 (163)

A critical analysis of deployed use cases for quantum key distribution and comparison with post-quantum cryptography. [PDF]

open access: yesEPJ Quantum Technol
Aquina N   +9 more
europepmc   +1 more source

Finding shortest lattice vectors faster using quantum search. [PDF]

open access: yesDes Codes Cryptogr, 2015
Laarhoven T, Mosca M, van de Pol J.
europepmc   +1 more source

Quantum secured blockchain framework for enhancing post quantum data security. [PDF]

open access: yesSci Rep
Reddy NR   +5 more
europepmc   +1 more source

Vulnerable Public Keys in NTRU Cryptosystem

Chinese Annals of Mathematics, Series B, 2020
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xu, Liqing   +3 more
openaire   +2 more sources

A matrix formulation for NTRU cryptosystem

2008 16th IEEE International Conference on Networks, 2008
In many business sectors sending secure information over public channels has become a challenging task. Data encryption is not the most efficient method to counteract attacks by adversaries. One form of encryption is to use the same key by the sender for encryption as well as the receiver for decryption.
Rakesh Nayak   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy