Results 11 to 20 of about 2,293 (163)
General statements and analysis of the end-to-end encryption algorithm NTRU Prime IIT Ukraine
The NTRU-like cryptosystem NTRU Prime IIT Ukraine, created on the basis of existing cryptographic transformations end-to-end encryption type, is considered. The description of this cryptosystem is given and its analysis is carried out. Also, features of its implementation, comparison of the main characteristics and indicators, as well as the definition
І.Д. Горбенко +2 more
openalex +3 more sources
Calculation of general parameters for NTRU PRIME UKRAINE of 6-7 levels of stability
The research was carried out and the development of an effective practical algorithm for the construction of system-wide parameters and keys for cryptographic transformations such as asymmetric ciphers and the key encapsulation protocol was performed.
І.Д. Горбенко +6 more
openalex +4 more sources
The research was carried out and the development of an effective practical algorithm for the construction of system-wide parameters and keys of cryptographic transformations such as asymmetric ciphers for a special form of setting the Product Form polynomial was performed.
І.Д. Горбенко +5 more
openalex +4 more sources
Modern cryptographic transformations of the end-to-end encryption type, namely – NTRU-like cryptosystems are considered. A new cryptographic system NTRU PRIME IIT UKRAINE was created based on existing cryptographic transformations of this type. A brief description of this cryptosystem is presented and an analysis of its resistance to known attacks is ...
І.Д. Горбенко +2 more
openalex +3 more sources
Will You Cross the Threshold for Me?
In this work, we propose generic and novel side-channel assisted chosenciphertext attacks on NTRU-based key encapsulation mechanisms (KEMs). These KEMs are IND-CCA secure, that is, they are secure in the chosen-ciphertext model.
Prasanna Ravi +4 more
doaj +1 more source
Multi‐key fully homomorphic encryption (MKFHE) allows computations on ciphertexts encrypted by different users, which can be applied to implement secure multi‐party computing (MPC).
TanPing Zhou +5 more
doaj +1 more source
Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs
This paper presents a side-channel analysis (SCA) on key encapsulation mechanism (KEM) based on the Fujisaki–Okamoto (FO) transformation and its variants.
Rei Ueno +5 more
doaj +1 more source
Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs
In this paper, we present a side-channel analysis (SCA) on key encapsulation mechanisms (KEMs) based on the Fujisaki–Okamoto (FO) transformation and its variants.
Yutaro Tanaka +5 more
doaj +1 more source
Single-Trace Attacks on Message Encoding in Lattice-Based KEMs
In this article, we propose single-trace side-channel attacks against lattice-based key encapsulation mechanisms (KEMs) that are the third-round candidates of the national institute of standards and technology (NIST) standardization project. Specifically,
Bo-Yeon Sim +8 more
doaj +1 more source
Ring Learning With Errors: A crossroads between postquantum cryptography, machine learning and number theory [PDF]
The present survey reports on the state of the art of the different cryptographic functionalities built upon the ring learning with errors problem and its interplay with several classical problems in algebraic number theory.
Chacón, Iván Blanco
core +2 more sources

