Results 131 to 140 of about 1,784 (149)
Some of the next articles are maybe not open access.
A comparative performance analysis of NTRU and its variant cryptosystems
2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT), 2017With the fast developing of computer hardware, many problems which are previously considered hard, will be solved practically. Number of theoretical problems that form the core of many public key cryptosystems are such of them. Therefore, new cryptosystems which are designed based on other mathematical techniques are of great demands.
Hassan R. Yassein, Nadia M. G. Al-Saidi
openaire +1 more source
A Proposal for SMS Security Using NTRU Cryptosystem
2013Short Message Service (SMS) is getting more popular now-a-days. It will play a very important role in the future business areas of mobile commerce (M-Commerce). Presently many business organizations are using SMS for their business purposes. SMS’s security has become a major concern for both business organizations and customers.
Ashok Kumar Nanda, Lalit Kumar Awasthi
openaire +1 more source
Matrix NTRU Cryptosystem over Integral Domain
2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs), 2023Indah E. Wijayanti +4 more
openaire +1 more source
A retrospective study on NTRU cryptosystem
AIP Conference Proceedings, 2022Sonam Mittal, K. R. Ramkumar
openaire +1 more source
Reaction Attacks in the Matrix Scheme of NTRU Cryptosystem
2011An attacker produces a sequence of encrypted messages E, each of which has a distinct probability, however small, of decrypting into a valid message and also a probability of decrypting into an invalid message. The smallest modification that an attacker can make to the cipher-text and can still decrypt it correctly, gives information about the private ...
Rakesh Nayak +2 more
openaire +1 more source
QTRU: Quaternionic Version of the NTRU Public-Key Cryptosystems
2011In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU.
Malekian, Ehsan +2 more
openaire +1 more source
Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2010The NTRU cryptosystem is a public key system based on lattice problems. While its theoretical security has been well studied, little effort has been made to analyze its security against implementation attacks including power analysis attacks. In this paper, we show that a typical software implementation of NTRU is vulnerable to the simple power ...
Mun-Kyu LEE +3 more
openaire +1 more source
A comparative analysis between NTRU and its some NTRU-Like cryptosystems
AIP Conference Proceedings, 2023Hassan Rashed Yassein +1 more
openaire +1 more source
DNA Cryptography Based on NTRU Cryptosystem to Improve Security
2022 IEEE 8th Information Technology International Seminar (ITIS), 2022U. Y. S Dwiko Satriyo +3 more
openaire +1 more source
Privacy-Preserving Neural Network Based on Multi-key NTRU Cryptosystem
2021 CAA Symposium on Fault Detection, Supervision, and Safety for Technical Processes (SAFEPROCESS), 2021Yuan Weng +5 more
openaire +1 more source

