Results 21 to 30 of about 175 (163)

Kyber, Saber, and SK‐MLWR Lattice‐Based Key Encapsulation Mechanisms Model Checking with Maude

open access: yesIET Information Security, Volume 2023, Issue 1, 2023., 2023
Facing the potential threat raised by quantum computing, a great deal of research from many groups and industrial giants has gone into building public‐key post‐quantum cryptographic primitives that are resistant to the quantum attackers. Among them, there is a large number of post‐quantum key encapsulation mechanisms (KEMs), whose purpose is to provide
Duong Dinh Tran   +5 more
wiley   +1 more source

Improved lattice enumeration algorithms by primal and dual reordering methods

open access: yesIET Information Security, Volume 17, Issue 1, Page 35-45, January 2023., 2023
Abstract The security of lattice‐based cryptosystems is generally based on the hardness of the Shortest Vector Problem (SVP). The original enumeration (ENUM) algorithm solving SVP runs in exponential time due to the exhaustive search, which is used as a subroutine for the block Korkin–Zolotarev (BKZ) algorithm.
Kazuki Yamamura   +2 more
wiley   +1 more source

LaTLS: A Lattice‐Based TLS Proxy Protocol

open access: yesChinese Journal of Electronics, Volume 31, Issue 2, Page 313-321, March 2022., 2022
The function of the Internet proxy is to check and convert the data exchanged between client and server. In fact, the two‐party secure communication protocol with good security is turned into an unsafe multiparty protocol. At present, there are relatively few proxy protocols that can be applied in practice.
Xinglong ZHANG   +2 more
wiley   +1 more source

Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited

open access: yesIET Information Security, Volume 16, Issue 1, Page 41-50, January 2022., 2022
Abstract For the purpose of improving the efficiency of the cryptosystems built upon lattice trapdoors, Chen, Genise and Mukherjee at ASIACRYPT 2019 modified the gadget trapdoor (G‐trapdoor) to an approximate trapdoor, which enables one to sample short preimages approximately from a discrete Gaussian distribution.
Huiwen Jia, Yupu Hu, Chunming Tang
wiley   +1 more source

Generic Construction of Forward‐Secure Revocable Identity‐Based Signature and Lattice‐Based Instantiations

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Forward‐secure revocation is a powerful cryptographic technique to alleviate key exposure attacks on identity‐based cryptosystems. In recent years, quantum computers have made some breakthroughs, so in the foreseeable future, existing cryptographic systems will be subject to quantum attacks.
Yan He   +5 more
wiley   +1 more source

A Blockchain-Based Secure Multi-Party Computation Scheme with Multi-Key Fully Homomorphic Proxy Re-Encryption

open access: yesInformation, 2022
At present, secure multi-party computing is an effective solution for organizations and institutions that want to derive greater value and benefit from the collaborative computing of their data.
Yongbo Jiang, Yuan Zhou, Tao Feng
doaj   +1 more source

A New Attack on NTRU Public Key Cryptosystem Depend on Using Public Key and Public Information [PDF]

open access: yesEngineering and Technology Journal, 2010
This paper proposed a new method to attack the NTRU cryptosystem [Hof00a,Hof98b]. It tried to exploit the public information about the parameters of NTRUcryptosystem and using the public key, to recover the private keys without delvingin the detail of ...
Abdul Monem S.Rahma   +1 more
doaj   +1 more source

Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
This paper presents a side-channel analysis (SCA) on key encapsulation mechanism (KEM) based on the Fujisaki–Okamoto (FO) transformation and its variants.
Rei Ueno   +5 more
doaj   +1 more source

Generalisations of NTRU cryptosystem

open access: yesSecurity and Communication Networks, 2016
AbstractSince the proposal of NTRU cryptosystem, many variants were proposed by the researcher using different‐different algebraic structure. In this article, we try to explore the existing variants of NTRU cryptosystem with their comparative study. Copyright © 2016 John Wiley & Sons, Ltd.
Sonika Singh, Sahadeo Padhye
openaire   +1 more source

MaTRU: A New NTRU-Based Cryptosystem [PDF]

open access: yes, 2005
In this paper, we propose a new variant of the NTRU public key cryptosystem – the MaTRU cryptosystem. MaTRU works under the same general principles as the NTRU cryptosystem, except that it operates in a different ring with a different linear transformation for encryption and decryption.
Michael Coglianese, Bok-Min Goi
openaire   +1 more source

Home - About - Disclaimer - Privacy