Results 121 to 130 of about 175 (163)
Some of the next articles are maybe not open access.

First-order collision attack on protected NTRU cryptosystem

Microprocessors and Microsystems, 2013
NTRU cryptosystem has been widely used in microsystems with low performance in computation. In 2010 Lee et al. gave several power analysis attacks on NTRU and three countermeasures, where they argued that only second-order power analysis can break their first countermeasure, and the combination of the first and third countermeasure is secure.
Xuexin Zheng, An Wang, Wei Wei
openaire   +1 more source

A new NTRU cryptosystem outperforms three highly secured NTRU-analog systems through an innovational algebraic structure

Journal of Discrete Mathematical Sciences and Cryptography, 2020
NTRU public key cryptosystem relies on computations that are efficiently performed with insignificant storage and time complexity.
Hassan R. Yassein   +2 more
openaire   +1 more source

NTRU and RSA Cryptosystems for Data Security in IoT Environment

2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE), 2020
The massive technological revolution that has taken place and that is going on at a massive rate, has led to zillions of digital information traveling in a communication network. Information traveling in the network needs security and privacy.
Ankitha Nandanavanam   +2 more
openaire   +1 more source

NTRU: A ring-based public key cryptosystem

1998
We describe NTRU, a new public key cryptosystem. NTRU features reasonably short, easily created keys, high speed, and low memory requirements. NTRU encryption and decryption use a mixing system suggested by polynomial algebra combined with a clustering principle based on elementary probability theory.
Jeffrey Hoffstein   +2 more
openaire   +1 more source

A comparative performance analysis of NTRU and its variant cryptosystems

2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT), 2017
With the fast developing of computer hardware, many problems which are previously considered hard, will be solved practically. Number of theoretical problems that form the core of many public key cryptosystems are such of them. Therefore, new cryptosystems which are designed based on other mathematical techniques are of great demands.
Hassan R. Yassein, Nadia M. G. Al-Saidi
openaire   +1 more source

A Proposal for SMS Security Using NTRU Cryptosystem

2013
Short Message Service (SMS) is getting more popular now-a-days. It will play a very important role in the future business areas of mobile commerce (M-Commerce). Presently many business organizations are using SMS for their business purposes. SMS’s security has become a major concern for both business organizations and customers.
Ashok Kumar Nanda, Lalit Kumar Awasthi
openaire   +1 more source

Matrix NTRU Cryptosystem over Integral Domain

2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs), 2023
Indah E. Wijayanti   +4 more
openaire   +1 more source

A retrospective study on NTRU cryptosystem

AIP Conference Proceedings, 2022
Sonam Mittal, K. R. Ramkumar
openaire   +1 more source

Reaction Attacks in the Matrix Scheme of NTRU Cryptosystem

2011
An attacker produces a sequence of encrypted messages E, each of which has a distinct probability, however small, of decrypting into a valid message and also a probability of decrypting into an invalid message. The smallest modification that an attacker can make to the cipher-text and can still decrypt it correctly, gives information about the private ...
Rakesh Nayak   +2 more
openaire   +1 more source

QTRU: Quaternionic Version of the NTRU Public-Key Cryptosystems

2011
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU.
Malekian, Ehsan   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy