Results 21 to 30 of about 2,231 (134)
A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Things [PDF]
The dawning era of quantum computing has initiated various initiatives for the standardization of post-quantum cryptosystems with the goal of (eventually) replacing RSA and ECC. NTRU Prime is a variant of the classical NTRU cryptosystem that comes with a couple of tweaks to minimize the attack surface; most notably, it avoids rings with “worrisome ...
Cheng, H. +4 more
openaire +2 more sources
LaTLS: A Lattice‐Based TLS Proxy Protocol
The function of the Internet proxy is to check and convert the data exchanged between client and server. In fact, the two‐party secure communication protocol with good security is turned into an unsafe multiparty protocol. At present, there are relatively few proxy protocols that can be applied in practice.
Xinglong ZHANG +2 more
wiley +1 more source
Accelerating LTV based homomorphic encryption in reconfigurable hardware [PDF]
After being introduced in 2009, the first fully homomorphic encryption (FHE) scheme has created significant excitement in academia and industry. Despite rapid advances in the last 6 years, FHE schemes are still not ready for deployment due to an ...
Doroz, Yarkin +6 more
core +1 more source
Optimization of NTRU Prime asymmetric encryption algorithm
The results of algorithms optimization for the post-quantum mechanism of asymmetric encryption NTRU Prime are given. Namely: module reduction, blinding polynomial calculation, encryption and decryption algorithms. A comparative analysis of different polynomials multiplications is also given.
Kachko, O. G. +3 more
openaire +1 more source
Provably Secure NTRU Instances over Prime Cyclotomic Rings [PDF]
Due to its remarkable performance and potential resistance to quantum attacks, \(\mathsf {NTRUEncrypt}\) has drawn much attention recently; it also has been standardized by IEEE. However, classical \(\mathsf {NTRUEncrypt}\) lacks a strong security guarantee and its security still relies on heuristic arguments.
Yang Yu, Guangwu Xu, Xiaoyun Wang
openaire +1 more source
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices [PDF]
In this paper, we study the Learning With Errors problem and its binary variant, where secrets and errors are binary or taken in a small interval. We introduce a new variant of the Blum, Kalai and Wasserman algorithm, relying on a quantization step that ...
A Blum +27 more
core +2 more sources
Ring Learning With Errors: A crossroads between postquantum cryptography, machine learning and number theory [PDF]
The present survey reports on the state of the art of the different cryptographic functionalities built upon the ring learning with errors problem and its interplay with several classical problems in algebraic number theory.
Chacón, Iván Blanco
core +2 more sources
Distribution of Inverses in Polynomial Rings [PDF]
NOTICE: this is the author's version of a work that was accepted for publication in Indagationes Mathematicae. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control ...
Banks, William David, 1964- +1 more
core +1 more source
Cloud Computing in the Quantum Era [PDF]
Cloud computing has become the prominent technology of this era. Its elasticity, dynamicity, availability, heterogeneity, and pay as you go pricing model has attracted several companies to migrate their businesses' services into the cloud.
Kaiiali, Mustafa +2 more
core +2 more sources
Towards Faster Cryptosystems, II [PDF]
http://www.math.missouri.edu/~bbanks/papers/index.htmlWe discuss three cryptosystems, NTRU, SPIFI , and ENROOT, that are based on the use of polynomials with restricted ...
Banks, William David, 1964-
core +1 more source

