Results 61 to 70 of about 1,784 (149)
Data privacy is crucial when dealing with biometric data. Accounting for the latest European data privacy regulation and payment service directive, biometric template protection is essential for any commercial application.
Busch, Christoph +4 more
core +1 more source
Certificateless Scheme Based NTRU Cryptosystem for Ad-Hoc UWB-IR Network [PDF]
Desde el mundo del radar y la investigación militar, la Radio de Impulso de Banda Ultra Ancha (UWB-IR) se adoptó en el mundo de las telecomunicaciones en la década de 1990'. Actualmente, la tecnología UWB-IR es un candidato interesante para las redes de sensores inalámbricos de corto alcance (WSN).
Jamel Miri +2 more
openaire +1 more source
A MULTI-DIMENSIONAL ALGEBRA FOR DESIGNING AN IMPROVED NTRU CRYPTOSYSTEM
The NTRU public key cryptosystem is essentially based on the Nth degree trun- cated polynomial ring Z[X]/XN−1 . By altering the Z[X]/XN−1 or its mathematical con- struction, many researchers have worked to improve NTRU. In this paper, we present a new multi-dimensional public key cryptosystem which depends on a commutative quaternion al- gebra with a
H.R. Yassein +2 more
openaire +1 more source
Using quantum key distribution for cryptographic purposes: a survey
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone
, +23 more
core +3 more sources
NTRU cryptosystem a solution to the quantum threat
Most of the current public key cryptosystems’ security is based on the integer factorization and the discrete logarithm, which are mathematical problems that are considered difficult to solve. However, the publication in 1994 of the Shor’s algorithm [1] was a major setback for the world of cryptography, since it provided a quantum algorithm capable of ...
Guiot Cusidó, Miquel +1 more
openaire +1 more source
New practical algorithms for the approximate shortest lattice vector [PDF]
We present a practical algorithm that given an LLL-reduced lattice basis of dimension n, runs in time O(n3(k=6)k=4+n4) and approximates the length of the shortest, non-zero lattice vector to within a factor (k=6)n=(2k). This result is based on reasonable
Schnorr, Claus Peter
core
Enhancing the NTRU Cryptosystem
Unnikrishnan Menon, Awnon Bhowmik
openaire +1 more source
A New NTRU-Type Public-Key Cryptosystem over the Binary Field
As the development of cloud computing and the convenience of wireless sensor netowrks, smart devices are widely used in daily life, but the security issues of the smart devices have not been well resolved. In this paper, we present a new NTRU-type public-key cryptosystem over the binary field.
Youyu Gu, Xiongwei Xie, Chunsheng Gu
openaire +1 more source
Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism. [PDF]
Seyhan K, Akleylek S.
europepmc +1 more source
Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. [PDF]
Farooq S +6 more
europepmc +1 more source

