Results 61 to 70 of about 2,231 (134)
Modern cryptographic transformations of the end-to-end encryption type, namely – NTRU-like cryptosystems are considered. A new cryptographic system NTRU PRIME IIT UKRAINE was created based on existing cryptographic transformations of this type. A brief description of this cryptosystem is presented and an analysis of its resistance to known attacks is ...
I.D. Gorbenko, O.G. Kachko, M.V. Yesina
openaire +1 more source
LWE‐based verifiable essential secret image sharing scheme ((t,s,k,n)$( {t,s,k,n} )$ ‐ VESIS)
This article introduces a verifiable essential secret image sharing scheme based on LWEs that employs Bloom filters and hash functions for verification. In traditional schemes, shareholders have similar situations, but the proposed scheme is designed for scenarios where shareholders hold distinct positions, essential and non‐essential.
Massoud Hadian Dehkordi +2 more
wiley +1 more source
URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme [PDF]
Design efficient lattice-based cryptosystem secure against adaptive chosen ciphertext attack (IND-CCA2) is a challenge problem. To the date, full CCA2-security of all proposed lattice-based PKE schemes achieved by using a generic transformations such as ...
Rastaghi, Roohallah
core
Hard isogeny problems over RSA moduli and groups with infeasible inversion [PDF]
We initiate the study of computational problems on elliptic curve isogeny graphs defined over RSA moduli. We conjecture that several variants of the neighbor-search problem over these graphs are hard, and provide a comprehensive list of cryptanalytic ...
Altug, Salim Ali, Chen, Yilei
core +1 more source
Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism. [PDF]
Seyhan K, Akleylek S.
europepmc +1 more source
Practical NTRU Signcryption in the Standard Model. [PDF]
Yan J +5 more
europepmc +1 more source
Identity-Based Proxy Signature with Message Recovery over NTRU Lattice. [PDF]
Wu F, Zhou B, Zhang X.
europepmc +1 more source
Security Analysis of DBTRU Cryptosystem. [PDF]
Tong X, Bi J, Duan Y, Li L, Wang L.
europepmc +1 more source
Testing isomorphism of lattices over CM-orders
A CM-order is a reduced order equipped with an involution that mimics complex conjugation. The Witt-Picard group of such an order is a certain group of ideal classes that is closely related to the "minus part" of the class group.
Lenstra Jr., Hendrik W. +1 more
core
Post quantum blockchain architecture for internet of things over NTRU lattice. [PDF]
Yuan B, Wu F, Zheng Z.
europepmc +1 more source

