Results 121 to 130 of about 1,784 (149)
A critical analysis of deployed use cases for quantum key distribution and comparison with post-quantum cryptography. [PDF]
Aquina N +9 more
europepmc +1 more source
Resilience of hospitals in an age of disruptions: a systematic literature review on resources and capabilities. [PDF]
Carbonara N, Pellegrino R, De Luca C.
europepmc +1 more source
Finding shortest lattice vectors faster using quantum search. [PDF]
Laarhoven T, Mosca M, van de Pol J.
europepmc +1 more source
Quantum secured blockchain framework for enhancing post quantum data security. [PDF]
Reddy NR +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Vulnerable Public Keys in NTRU Cryptosystem
Chinese Annals of Mathematics, Series B, 2020zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xu, Liqing +3 more
openaire +2 more sources
A matrix formulation for NTRU cryptosystem
2008 16th IEEE International Conference on Networks, 2008In many business sectors sending secure information over public channels has become a challenging task. Data encryption is not the most efficient method to counteract attacks by adversaries. One form of encryption is to use the same key by the sender for encryption as well as the receiver for decryption.
Rakesh Nayak +2 more
openaire +1 more source
First-order collision attack on protected NTRU cryptosystem
Microprocessors and Microsystems, 2013NTRU cryptosystem has been widely used in microsystems with low performance in computation. In 2010 Lee et al. gave several power analysis attacks on NTRU and three countermeasures, where they argued that only second-order power analysis can break their first countermeasure, and the combination of the first and third countermeasure is secure.
Xuexin Zheng, An Wang, Wei Wei
openaire +1 more source
Journal of Discrete Mathematical Sciences and Cryptography, 2020
NTRU public key cryptosystem relies on computations that are efficiently performed with insignificant storage and time complexity.
Hassan R. Yassein +2 more
openaire +1 more source
NTRU public key cryptosystem relies on computations that are efficiently performed with insignificant storage and time complexity.
Hassan R. Yassein +2 more
openaire +1 more source
NTRU and RSA Cryptosystems for Data Security in IoT Environment
2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE), 2020The massive technological revolution that has taken place and that is going on at a massive rate, has led to zillions of digital information traveling in a communication network. Information traveling in the network needs security and privacy.
Ankitha Nandanavanam +2 more
openaire +1 more source
NTRU: A ring-based public key cryptosystem
1998We describe NTRU, a new public key cryptosystem. NTRU features reasonably short, easily created keys, high speed, and low memory requirements. NTRU encryption and decryption use a mixing system suggested by polynomial algebra combined with a clustering principle based on elementary probability theory.
Jeffrey Hoffstein +2 more
openaire +1 more source

