Results 121 to 130 of about 1,784 (149)

A critical analysis of deployed use cases for quantum key distribution and comparison with post-quantum cryptography. [PDF]

open access: yesEPJ Quantum Technol
Aquina N   +9 more
europepmc   +1 more source

Finding shortest lattice vectors faster using quantum search. [PDF]

open access: yesDes Codes Cryptogr, 2015
Laarhoven T, Mosca M, van de Pol J.
europepmc   +1 more source

Quantum secured blockchain framework for enhancing post quantum data security. [PDF]

open access: yesSci Rep
Reddy NR   +5 more
europepmc   +1 more source
Some of the next articles are maybe not open access.

Related searches:

Vulnerable Public Keys in NTRU Cryptosystem

Chinese Annals of Mathematics, Series B, 2020
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xu, Liqing   +3 more
openaire   +2 more sources

A matrix formulation for NTRU cryptosystem

2008 16th IEEE International Conference on Networks, 2008
In many business sectors sending secure information over public channels has become a challenging task. Data encryption is not the most efficient method to counteract attacks by adversaries. One form of encryption is to use the same key by the sender for encryption as well as the receiver for decryption.
Rakesh Nayak   +2 more
openaire   +1 more source

First-order collision attack on protected NTRU cryptosystem

Microprocessors and Microsystems, 2013
NTRU cryptosystem has been widely used in microsystems with low performance in computation. In 2010 Lee et al. gave several power analysis attacks on NTRU and three countermeasures, where they argued that only second-order power analysis can break their first countermeasure, and the combination of the first and third countermeasure is secure.
Xuexin Zheng, An Wang, Wei Wei
openaire   +1 more source

A new NTRU cryptosystem outperforms three highly secured NTRU-analog systems through an innovational algebraic structure

Journal of Discrete Mathematical Sciences and Cryptography, 2020
NTRU public key cryptosystem relies on computations that are efficiently performed with insignificant storage and time complexity.
Hassan R. Yassein   +2 more
openaire   +1 more source

NTRU and RSA Cryptosystems for Data Security in IoT Environment

2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE), 2020
The massive technological revolution that has taken place and that is going on at a massive rate, has led to zillions of digital information traveling in a communication network. Information traveling in the network needs security and privacy.
Ankitha Nandanavanam   +2 more
openaire   +1 more source

NTRU: A ring-based public key cryptosystem

1998
We describe NTRU, a new public key cryptosystem. NTRU features reasonably short, easily created keys, high speed, and low memory requirements. NTRU encryption and decryption use a mixing system suggested by polynomial algebra combined with a clustering principle based on elementary probability theory.
Jeffrey Hoffstein   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy