Results 121 to 130 of about 2,293 (163)
Length-Weight Distribution of Non-Zero Elements in Randomized Bit Sequences. [PDF]
Lange C +3 more
europepmc +1 more source
On the Security and Efficiency of TLS 1.3 Handshake with Hybrid Key Exchange from CPA-Secure KEMs. [PDF]
Chen J, Peng W, Wang Y, Bian Y.
europepmc +1 more source
Efficient computation of polynomial multiplication over characteristic three fields is required for post-quantum cryptographic applications which gain importance upon the recent advances in quantum computers. In this paper, we propose three new polynomial multiplication algorithms over F-3 and show that they are more efficient than the current state-of-
Esra Yeniaras, Murat Cenk
openalex +3 more sources
This paper proposes a new single-trace side-channel attack on lattice-based post-quantum protocols. We target the ω-small polynomial sampling of NTRU, NTRU Prime, and CRYSTALS-DILITHIUM algorithm implementations (which are NIST Round-3 finalist and alternative candidates), and we demonstrate the vulnerabilities of their sub-routines to a power-based ...
Emre Karabulut +2 more
openalex +3 more sources
Efficient Multiplier and FPGA Implementation for NTRU Prime
As quantum computing age is emerging on horizon, many of the current cryptography standards, e.g., RSA and Elliptic Curve Cryptography, are shown to be compromised under quantum attacks according to Shor's algorithm. A multiple-round competition has been launched by NIST to decide the next generation post-quantum cryptography (PQC) standards since 2017.
Huapeng Wu, Xi Gao
openalex +2 more sources
A Constant Time Full Hardware Implementation of Streamlined NTRU Prime
This paper presents a constant time hardware implementation of the NIST round 2 post-quantum cryptographic algorithm Streamlined NTRU Prime. We implement the entire KEM algorithm, including all steps for key generation, encapsulation and decapsulation, and all en- and decoding. We focus on optimizing the resources used, as well as applying optimization
Adrian Marotzke
openalex +2 more sources
A Proposal for Efficient Multiplication and Inverse Calculation in Streamlined NTRU Prime
Masakazu Awakiahra +5 more
openalex +2 more sources
CALCULATION OF GENERAL PARAMETERS FOR NTRU PRIME UKRAINE OF 6-7 LEVELS OF STABILITY
І.Д. Горбенко +7 more
openalex +2 more sources
ANALYSIS OF ASYMMETRIC NTRU PRIME IIT UKRAINE ENCRYPTION ALGORITHM WITH REGARDS TO KNOWN ATTACKS
І.Д. Горбенко +2 more
openalex +2 more sources

