Results 51 to 60 of about 175 (163)

EPN:encryption padding for NTRU with provable security

open access: yesTongxin xuebao, 2008
Known as the fastest public key cryptosystem available now,the provable security of NTRU has not been solved well.an encryption padding,called EPN was designed,for NTRU.Under the full domain one wayness assumption of NTRU,EPN had been proved ...
MU Ning-bo, HU Yu-pu, WANG Bao-cang
doaj   +2 more sources

QIoTChain: Quantum IoT‐blockchain fusion for advanced data protection in Industry 4.0

open access: yesIET Blockchain, Volume 4, Issue 3, Page 252-262, September 2024.
Data underpins modern society and the economy, enabling informed choices and innovation. Protecting data from tampering is crucial, leading to encryption using cryptography, blockchain, and zero trust models. Quantum computing advances aid post‐quantum security, yet adoption hurdles persist.
Aditya Kumar Sharma   +3 more
wiley   +1 more source

LWE‐based verifiable essential secret image sharing scheme ((t,s,k,n)$( {t,s,k,n} )$ ‐ VESIS)

open access: yesIET Image Processing, Volume 18, Issue 4, Page 1053-1072, 27 March 2024.
This article introduces a verifiable essential secret image sharing scheme based on LWEs that employs Bloom filters and hash functions for verification. In traditional schemes, shareholders have similar situations, but the proposed scheme is designed for scenarios where shareholders hold distinct positions, essential and non‐essential.
Massoud Hadian Dehkordi   +2 more
wiley   +1 more source

Post-Quantum Cryptographic Frameworks for Internet of Things (IoT) and Internet of Medical Things (IoMT) Authentication Systems [PDF]

open access: yesPhysics Access
The rapid advancement of quantum computing threatens the security of classical cryptographic algorithms widely used in Internet of Things (IoT) and Internet of Medical Things (IoMT) systems.
Thomas L Barna   +4 more
doaj   +1 more source

A survey on post‐quantum based approaches for edge computing security

open access: yesWIREs Computational Statistics, Volume 16, Issue 1, January/February 2024.
The distribution of reviewed papers by focused area. Abstract With the development of technology and its integration with scientific realities, computer systems continue to evolve as infrastructure. One of the most important obstacles in front of quantum computers with high‐speed processing is that its existing systems cause security vulnerabilities ...
Aykut Karakaya, Ahmet Ulu
wiley   +1 more source

New NTRU Cryptosystem with Pauli Matrix

open access: yesInternational Journal of Scientific Research in Science and Technology
The NTRU public key cryptosystem was first presented by J. Hoffstein,J. H. Silverman and J. Pipher in 1996. This system is based on shortest and closest vector problem in a lattice and its operations are based on objects of a truncated polynomial ring.
null Priya Verma   +2 more
openaire   +1 more source

On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Lattice‐based encryption schemes are significant cryptographic primitives to defend information security against quantum menace, and the decryption failure rate is related to both theoretical and realistic security. We quantitatively analyze how the floating‐point arithmetic and neglecting small probabilities impact the precision, and propose a new ...
Lin Wang   +3 more
wiley   +1 more source

Fast and Power-Analysis Resistant Ring Lizard Crypto-Processor Based on the Sparse Ternary Property

open access: yesIEEE Access, 2019
Ring Lizard (RLizard) is a quantum-resistant public-key cryptosystem based on the ideal lattice. RLizard uses a sparse ternary polynomial, which facilitates implementation with lower complexity.
Piljoo Choi, Ji-Hoon Kim, Dong Kyue Kim
doaj   +1 more source

Certificateless Scheme Based NTRU Cryptosystem for Ad-Hoc UWB-IR Network [PDF]

open access: yesSSRN Electronic Journal, 2017
Desde el mundo del radar y la investigación militar, la Radio de Impulso de Banda Ultra Ancha (UWB-IR) se adoptó en el mundo de las telecomunicaciones en la década de 1990'. Actualmente, la tecnología UWB-IR es un candidato interesante para las redes de sensores inalámbricos de corto alcance (WSN).
Jamel Miri   +2 more
openaire   +1 more source

A MULTI-DIMENSIONAL ALGEBRA FOR DESIGNING AN IMPROVED NTRU CRYPTOSYSTEM

open access: yesEURASIAN JOURNAL OF MATHEMATICAL AND COMPUTER APPLICATIONS, 2020
The NTRU public key cryptosystem is essentially based on the Nth degree trun- cated polynomial ring Z[X]/XN−1 . By altering the Z[X]/XN−1 or its mathematical con- struction, many researchers have worked to improve NTRU. In this paper, we present a new multi-dimensional public key cryptosystem which depends on a commutative quaternion al- gebra with a
H.R. Yassein   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy