Results 11 to 20 of about 2,293 (163)

General statements and analysis of the end-to-end encryption algorithm NTRU Prime IIT Ukraine

open access: diamondRadiotekhnika, 2018
The NTRU-like cryptosystem NTRU Prime IIT Ukraine, created on the basis of existing cryptographic transformations end-to-end encryption type, is considered. The description of this cryptosystem is given and its analysis is carried out. Also, features of its implementation, comparison of the main characteristics and indicators, as well as the definition
І.Д. Горбенко   +2 more
openalex   +3 more sources

Calculation of general parameters for NTRU PRIME UKRAINE of 6-7 levels of stability

open access: diamondRadiotekhnika, 2018
The research was carried out and the development of an effective practical algorithm for the construction of system-wide parameters and keys for cryptographic transformations such as asymmetric ciphers and the key encapsulation protocol was performed.
І.Д. Горбенко   +6 more
openalex   +4 more sources

Methods for constructing system-wide parameters and keys for NTRU PRIME UKRAINE 5 – 7 stabvility levels. Product form

open access: diamondRadiotekhnika, 2018
The research was carried out and the development of an effective practical algorithm for the construction of system-wide parameters and keys of cryptographic transformations such as asymmetric ciphers for a special form of setting the Product Form polynomial was performed.
І.Д. Горбенко   +5 more
openalex   +4 more sources

Analysis of the end-to-end encryption algorithm NTRU PRIME IIT UKRAINE taking into account known attacks

open access: diamondRadiotekhnika, 2017
Modern cryptographic transformations of the end-to-end encryption type, namely – NTRU-like cryptosystems are considered. A new cryptographic system NTRU PRIME IIT UKRAINE was created based on existing cryptographic transformations of this type. A brief description of this cryptosystem is presented and an analysis of its resistance to known attacks is ...
І.Д. Горбенко   +2 more
openalex   +3 more sources

Will You Cross the Threshold for Me?

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
In this work, we propose generic and novel side-channel assisted chosenciphertext attacks on NTRU-based key encapsulation mechanisms (KEMs). These KEMs are IND-CCA secure, that is, they are secure in the chosen-ciphertext model.
Prasanna Ravi   +4 more
doaj   +1 more source

Efficient multi‐key fully homomorphic encryption over prime cyclotomic rings with fewer relinearisations

open access: yesIET Information Security, 2021
Multi‐key fully homomorphic encryption (MKFHE) allows computations on ciphertexts encrypted by different users, which can be applied to implement secure multi‐party computing (MPC).
TanPing Zhou   +5 more
doaj   +1 more source

Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
This paper presents a side-channel analysis (SCA) on key encapsulation mechanism (KEM) based on the Fujisaki–Okamoto (FO) transformation and its variants.
Rei Ueno   +5 more
doaj   +1 more source

Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In this paper, we present a side-channel analysis (SCA) on key encapsulation mechanisms (KEMs) based on the Fujisaki–Okamoto (FO) transformation and its variants.
Yutaro Tanaka   +5 more
doaj   +1 more source

Single-Trace Attacks on Message Encoding in Lattice-Based KEMs

open access: yesIEEE Access, 2020
In this article, we propose single-trace side-channel attacks against lattice-based key encapsulation mechanisms (KEMs) that are the third-round candidates of the national institute of standards and technology (NIST) standardization project. Specifically,
Bo-Yeon Sim   +8 more
doaj   +1 more source

Ring Learning With Errors: A crossroads between postquantum cryptography, machine learning and number theory [PDF]

open access: yes, 2020
The present survey reports on the state of the art of the different cryptographic functionalities built upon the ring learning with errors problem and its interplay with several classical problems in algebraic number theory.
Chacón, Iván Blanco
core   +2 more sources

Home - About - Disclaimer - Privacy