Results 51 to 60 of about 1,784 (149)

How to obtain a lattice basis from a discrete projected space [PDF]

open access: yes, 2005
International audienceEuclidean spaces of dimension n are characterized in discrete spaces by the choice of lattices. The goal of this paper is to provide a simple algorithm finding a lattice onto subspaces of lower dimensions onto which these discrete ...
A. Aldroubi   +6 more
core   +3 more sources

A Lattice-Based Group Authentication Scheme

open access: yesApplied Sciences, 2018
Authentication has been adopted in many areas, but most of these authentication schemes are built using traditional cryptographic primitives. It is widely believed that such primitives are not resistant to quantum algorithms.
Jheng-Jia Huang   +3 more
doaj   +1 more source

URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme [PDF]

open access: yes, 2013
Design efficient lattice-based cryptosystem secure against adaptive chosen ciphertext attack (IND-CCA2) is a challenge problem. To the date, full CCA2-security of all proposed lattice-based PKE schemes achieved by using a generic transformations such as ...
Rastaghi, Roohallah
core  

Bandwidth-optimized parallel private information retrieval [PDF]

open access: yes, 2014
We present improved and parallel versions of Lipmaa’s computationally-private information retrieval (CPIR) protocol based on a additively-homomorphic cryptosystem.
Savaş, Erkay, Ünal, Ecem
core   +1 more source

EPN:encryption padding for NTRU with provable security

open access: yesTongxin xuebao, 2008
Known as the fastest public key cryptosystem available now,the provable security of NTRU has not been solved well.an encryption padding,called EPN was designed,for NTRU.Under the full domain one wayness assumption of NTRU,EPN had been proved ...
MU Ning-bo, HU Yu-pu, WANG Bao-cang
doaj   +2 more sources

A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM [PDF]

open access: yes, 2017
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications, in particular, as an essential building block for two-party and multi-party computation.
Barreto, Paulo S. L. M.   +4 more
core   +1 more source

Post-Quantum Cryptographic Frameworks for Internet of Things (IoT) and Internet of Medical Things (IoMT) Authentication Systems [PDF]

open access: yesPhysics Access
The rapid advancement of quantum computing threatens the security of classical cryptographic algorithms widely used in Internet of Things (IoT) and Internet of Medical Things (IoMT) systems.
Thomas L Barna   +4 more
doaj   +1 more source

Secret Sharing for Cloud Data Security

open access: yes, 2017
Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud ...
Attasena, Varunya   +2 more
core   +1 more source

Fast and Power-Analysis Resistant Ring Lizard Crypto-Processor Based on the Sparse Ternary Property

open access: yesIEEE Access, 2019
Ring Lizard (RLizard) is a quantum-resistant public-key cryptosystem based on the ideal lattice. RLizard uses a sparse ternary polynomial, which facilitates implementation with lower complexity.
Piljoo Choi, Ji-Hoon Kim, Dong Kyue Kim
doaj   +1 more source

New NTRU Cryptosystem with Pauli Matrix

open access: yesInternational Journal of Scientific Research in Science and Technology
The NTRU public key cryptosystem was first presented by J. Hoffstein,J. H. Silverman and J. Pipher in 1996. This system is based on shortest and closest vector problem in a lattice and its operations are based on objects of a truncated polynomial ring.
null Priya Verma   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy