Results 11 to 20 of about 1,784 (149)

ALGEBRAIC CRYPTANALYSIS ON NTRU-HPS AND NTRU-HRSS

open access: yesBarekeng, 2023
NTRU is a lattice-based public-key cryptosystem designed by Hoffstein, Pipher, and Silverman in 1996. NTRU published on Algorithmic Number Theory Symposium (ANTS) in 1998.
Fadila Paradise, Kiki Ariyanti Sugeng
doaj   +1 more source

NTRU-type fully homomorphic encryption scheme without key switching

open access: yes网络与信息安全学报, 2017
In order to construct a fully homomorphic encryption scheme based on NTRU cryptosystem from ring learning with errors, noise growth and homomorphic property in the NTRU cryptosystem were analyzed. The con-cept of zero homomorphic encryption was introdced
Xin-xia SONG   +2 more
doaj   +3 more sources

Post-quantum cryptography-driven security framework for cloud computing

open access: yesOpen Computer Science, 2022
Data security in the cloud has been a major issue since the inception and adoption of cloud computing. Various frameworks have been proposed, and yet data breach prevails.
Ukwuoma Henry Chima   +3 more
doaj   +1 more source

CQTRU: A Commutative Quaternions Rings Based Public Key Cryptosystem [PDF]

open access: yesEngineering and Technology Journal, 2016
In this paper, we propose a new version of the NTRU public key cryptosystem called CQTRU. It is a four-dimensional cryptosystem based on the commutative quaternion ring.
Nadia M.G. Alsaidi   +2 more
doaj   +1 more source

Lattice Attacks on NTRU Revisited

open access: yesIEEE Access, 2021
NTRU cryptosystem was proposed by J. Hoffstein, J.Pipher and J.H. Silverman in 1996, whose security is related to the hardness of finding sufficient short vectors in NTRU lattice with dimension $2N$ .
Jingguo Bi, Lidong Han
doaj   +1 more source

Security Analysis of Hybrid Attack for NTRU-Class Encryption Schemes

open access: yesIEEE Access, 2023
One of the significant post-quantum cryptographic candidates is the NTRU public key cryptosystem. It operates on polynomial rings, where the parameter largely determines the security of the system.
Alla Levina   +2 more
doaj   +1 more source

High-order masking of NTRU

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
The main protection against side-channel attacks consists in computing every function with multiple shares via the masking countermeasure. While the masking countermeasure was originally developed for securing block-ciphers such as AES, the protection ...
Jean-Sébastien Coron   +3 more
doaj   +1 more source

A Blockchain-Based Secure Multi-Party Computation Scheme with Multi-Key Fully Homomorphic Proxy Re-Encryption

open access: yesInformation, 2022
At present, secure multi-party computing is an effective solution for organizations and institutions that want to derive greater value and benefit from the collaborative computing of their data.
Yongbo Jiang, Yuan Zhou, Tao Feng
doaj   +1 more source

Ring Learning With Errors: A crossroads between postquantum cryptography, machine learning and number theory [PDF]

open access: yes, 2020
The present survey reports on the state of the art of the different cryptographic functionalities built upon the ring learning with errors problem and its interplay with several classical problems in algebraic number theory.
Chacón, Iván Blanco
core   +2 more sources

A New Attack on NTRU Public Key Cryptosystem Depend on Using Public Key and Public Information [PDF]

open access: yesEngineering and Technology Journal, 2010
This paper proposed a new method to attack the NTRU cryptosystem [Hof00a,Hof98b]. It tried to exploit the public information about the parameters of NTRUcryptosystem and using the public key, to recover the private keys without delvingin the detail of ...
Abdul Monem S.Rahma   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy