Results 31 to 40 of about 175 (163)
Q-NTRU Cryptosystem for IoT Applications
Interesting in the Internet of things (IoT) has begun to grow rapidly since it deals with the everyday needs of humans and becomes dealing with a huge amount of personal information. This expansion is accompanied by a number of challenges; one of them is the need for solving the problem of security challenges by using algorithms with high security and ...
Omar Sapti Guma'a +2 more
openaire +2 more sources
Polynomial equation in algebraic attack on NTRU-HPS and NTRU-HRSS [PDF]
NTRU is a lattice-based public-key cryptosystem designed by Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman in 1996. NTRU published on Algorithmic Number Theory Symposium (ANTS) in 1998.
Paradise Fadila, Sugeng Kiki Ariyanti
doaj +1 more source
The advent of quantum computing with high processing capabilities will enable brute force attacks in short periods of time, threatening current secure communication channels.
Eros Camacho-Ruiz +3 more
doaj +1 more source
Enhanced NTRU cryptosystem eliminating decryption failures
Summary: An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model and chosen-ciphertext attacks. Because lattice reduction is the main threat to lattice-based cryptosystems, lattice reduction algorithms are analyzed to evaluate the security of this scheme.
Yao, Jun, Zeng, Guihua
openaire +1 more source
Secure data storage and access for fish monitoring in cloud environment
Cloud computing (CC) refers to the on-demand availability of computer system resources, specifically data storage and computational power, without the user's direct active administration.
K.S. Saraswathy, S.S. Sujatha
doaj +1 more source
A New Provably Secure Cryptosystem Using Dedekind Domain Direct Product Approach
We would like to prevent, detect, and protect communication and information systems' attacks, which include unauthorized reading of a message of file and traffic analysis or active attacks, such as modification of messages or files, and denial of service
Amir Hassani Karbasi
doaj +1 more source
A framework for cryptographic problems from linear algebra
We introduce a general framework encompassing the main hard problems emerging in lattice-based cryptography, which naturally includes the recently proposed Mersenne prime cryptosystem, but also problems coming from code-based cryptography.
Bootland Carl +3 more
doaj +1 more source
On the distribution of Low Hamming Weight products
Jeffrey Hoffstein et al. (Discrete Appl. Math. 130:37–49, 2003) introduced the Low Hamming Weight products (LHWP) X = x 1 x 2 x 3 $X=x_{1}x_{2}x_{3}$ as random exponent of elements in a group or a ring to improve the operational efficiency, where each x ...
Jianghua Li, Qiao Li
doaj +1 more source
A Logical XOR Operation for NTRU Cryptosystem
The NTRU public key cryptosystem was first presented by J. Hoffstein, J. H. Silverman and J. Pipher in 1996. This system is based on shortest and closest vector problem in a lattice and operations based on objects in a truncated polynomial ring. In this paper we propose new variant of NTRU cryptosystem which is based on logical exclusive OR operator ...
Khushboo Thakur, Bhanu Pratap
openaire +1 more source
An NTRU-like Message Recoverable Signature Algorithm
An important feature of Nyberg-Rueppel type digital signature algorithms is message recovery, this signature algorithm can recover the original information from the signature directly by the verifier in the verification phase after signing the message ...
Tingle Shen, Li Miao, Bin Hua, Shuai Li
doaj +1 more source

