Results 31 to 40 of about 175 (163)

Q-NTRU Cryptosystem for IoT Applications

open access: yesJournal of Southwest Jiaotong University, 2019
Interesting in the Internet of things (IoT) has begun to grow rapidly since it deals with the everyday needs of humans and becomes dealing with a huge amount of personal information. This expansion is accompanied by a number of challenges; one of them is the need for solving the problem of security challenges by using algorithms with high security and ...
Omar Sapti Guma'a   +2 more
openaire   +2 more sources

Polynomial equation in algebraic attack on NTRU-HPS and NTRU-HRSS [PDF]

open access: yesITM Web of Conferences
NTRU is a lattice-based public-key cryptosystem designed by Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman in 1996. NTRU published on Algorithmic Number Theory Symposium (ANTS) in 1998.
Paradise Fadila, Sugeng Kiki Ariyanti
doaj   +1 more source

Timing-Attack-Resistant Acceleration of NTRU Round 3 Encryption on Resource-Constrained Embedded Systems

open access: yesCryptography, 2023
The advent of quantum computing with high processing capabilities will enable brute force attacks in short periods of time, threatening current secure communication channels.
Eros Camacho-Ruiz   +3 more
doaj   +1 more source

Enhanced NTRU cryptosystem eliminating decryption failures

open access: yesJournal of Systems Engineering and Electronics, 2006
Summary: An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model and chosen-ciphertext attacks. Because lattice reduction is the main threat to lattice-based cryptosystems, lattice reduction algorithms are analyzed to evaluate the security of this scheme.
Yao, Jun, Zeng, Guihua
openaire   +1 more source

Secure data storage and access for fish monitoring in cloud environment

open access: yesMeasurement: Sensors, 2023
Cloud computing (CC) refers to the on-demand availability of computer system resources, specifically data storage and computational power, without the user's direct active administration.
K.S. Saraswathy, S.S. Sujatha
doaj   +1 more source

A New Provably Secure Cryptosystem Using Dedekind Domain Direct Product Approach

open access: yesRatio Mathematica, 2018
We would like to prevent, detect, and protect communication and information systems' attacks, which include unauthorized reading of a message of file and traffic analysis or active attacks, such as modification of messages or files, and denial of service
Amir Hassani Karbasi
doaj   +1 more source

A framework for cryptographic problems from linear algebra

open access: yesJournal of Mathematical Cryptology, 2020
We introduce a general framework encompassing the main hard problems emerging in lattice-based cryptography, which naturally includes the recently proposed Mersenne prime cryptosystem, but also problems coming from code-based cryptography.
Bootland Carl   +3 more
doaj   +1 more source

On the distribution of Low Hamming Weight products

open access: yesJournal of Inequalities and Applications, 2020
Jeffrey Hoffstein et al. (Discrete Appl. Math. 130:37–49, 2003) introduced the Low Hamming Weight products (LHWP) X = x 1 x 2 x 3 $X=x_{1}x_{2}x_{3}$ as random exponent of elements in a group or a ring to improve the operational efficiency, where each x ...
Jianghua Li, Qiao Li
doaj   +1 more source

A Logical XOR Operation for NTRU Cryptosystem

open access: yesInternational Journal of Computer Applications, 2015
The NTRU public key cryptosystem was first presented by J. Hoffstein, J. H. Silverman and J. Pipher in 1996. This system is based on shortest and closest vector problem in a lattice and operations based on objects in a truncated polynomial ring. In this paper we propose new variant of NTRU cryptosystem which is based on logical exclusive OR operator ...
Khushboo Thakur, Bhanu Pratap
openaire   +1 more source

An NTRU-like Message Recoverable Signature Algorithm

open access: yesMathematics
An important feature of Nyberg-Rueppel type digital signature algorithms is message recovery, this signature algorithm can recover the original information from the signature directly by the verifier in the verification phase after signing the message ...
Tingle Shen, Li Miao, Bin Hua, Shuai Li
doaj   +1 more source

Home - About - Disclaimer - Privacy