Results 21 to 30 of about 1,784 (149)
Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs
This paper presents a side-channel analysis (SCA) on key encapsulation mechanism (KEM) based on the Fujisaki–Okamoto (FO) transformation and its variants.
Rei Ueno +5 more
doaj +1 more source
Distribution of Inverses in Polynomial Rings [PDF]
NOTICE: this is the author's version of a work that was accepted for publication in Indagationes Mathematicae. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control ...
Banks, William David, 1964- +1 more
core +1 more source
Generalisations of NTRU cryptosystem
AbstractSince the proposal of NTRU cryptosystem, many variants were proposed by the researcher using different‐different algebraic structure. In this article, we try to explore the existing variants of NTRU cryptosystem with their comparative study. Copyright © 2016 John Wiley & Sons, Ltd.
Sonika Singh, Sahadeo Padhye
openaire +1 more source
MaTRU: A New NTRU-Based Cryptosystem [PDF]
In this paper, we propose a new variant of the NTRU public key cryptosystem – the MaTRU cryptosystem. MaTRU works under the same general principles as the NTRU cryptosystem, except that it operates in a different ring with a different linear transformation for encryption and decryption.
Michael Coglianese, Bok-Min Goi
openaire +1 more source
Q-NTRU Cryptosystem for IoT Applications
Interesting in the Internet of things (IoT) has begun to grow rapidly since it deals with the everyday needs of humans and becomes dealing with a huge amount of personal information. This expansion is accompanied by a number of challenges; one of them is the need for solving the problem of security challenges by using algorithms with high security and ...
Omar Sapti Guma'a +2 more
openaire +2 more sources
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices [PDF]
In this paper, we study the Learning With Errors problem and its binary variant, where secrets and errors are binary or taken in a small interval. We introduce a new variant of the Blum, Kalai and Wasserman algorithm, relying on a quantization step that ...
A Blum +27 more
core +2 more sources
Towards Faster Cryptosystems, II [PDF]
http://www.math.missouri.edu/~bbanks/papers/index.htmlWe discuss three cryptosystems, NTRU, SPIFI , and ENROOT, that are based on the use of polynomials with restricted ...
Banks, William David, 1964-
core +1 more source
The advent of quantum computing with high processing capabilities will enable brute force attacks in short periods of time, threatening current secure communication channels.
Eros Camacho-Ruiz +3 more
doaj +1 more source
Privacy-aware multi-context RFID infrastructure using public key cryptography [PDF]
We propose a novel RFID infrastructure design, which foresees the usage of a single RFID tag within different contexts and for multiple purposes.
A. Juels +8 more
core +1 more source
Polynomial equation in algebraic attack on NTRU-HPS and NTRU-HRSS [PDF]
NTRU is a lattice-based public-key cryptosystem designed by Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman in 1996. NTRU published on Algorithmic Number Theory Symposium (ANTS) in 1998.
Paradise Fadila, Sugeng Kiki Ariyanti
doaj +1 more source

