Results 61 to 70 of about 2,231 (134)

Analysis of the end-to-end encryption algorithm NTRU PRIME IIT UKRAINE taking into account known attacks

open access: yesRadiotekhnika, 2017
Modern cryptographic transformations of the end-to-end encryption type, namely – NTRU-like cryptosystems are considered. A new cryptographic system NTRU PRIME IIT UKRAINE was created based on existing cryptographic transformations of this type. A brief description of this cryptosystem is presented and an analysis of its resistance to known attacks is ...
I.D. Gorbenko, O.G. Kachko, M.V. Yesina
openaire   +1 more source

LWE‐based verifiable essential secret image sharing scheme ((t,s,k,n)$( {t,s,k,n} )$ ‐ VESIS)

open access: yesIET Image Processing, Volume 18, Issue 4, Page 1053-1072, 27 March 2024.
This article introduces a verifiable essential secret image sharing scheme based on LWEs that employs Bloom filters and hash functions for verification. In traditional schemes, shareholders have similar situations, but the proposed scheme is designed for scenarios where shareholders hold distinct positions, essential and non‐essential.
Massoud Hadian Dehkordi   +2 more
wiley   +1 more source

URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme [PDF]

open access: yes, 2013
Design efficient lattice-based cryptosystem secure against adaptive chosen ciphertext attack (IND-CCA2) is a challenge problem. To the date, full CCA2-security of all proposed lattice-based PKE schemes achieved by using a generic transformations such as ...
Rastaghi, Roohallah
core  

Hard isogeny problems over RSA moduli and groups with infeasible inversion [PDF]

open access: yes, 2019
We initiate the study of computational problems on elliptic curve isogeny graphs defined over RSA moduli. We conjecture that several variants of the neighbor-search problem over these graphs are hard, and provide a comprehensive list of cryptanalytic ...
Altug, Salim Ali, Chen, Yilei
core   +1 more source

Practical NTRU Signcryption in the Standard Model. [PDF]

open access: yesEntropy (Basel), 2023
Yan J   +5 more
europepmc   +1 more source

Security Analysis of DBTRU Cryptosystem. [PDF]

open access: yesEntropy (Basel), 2022
Tong X, Bi J, Duan Y, Li L, Wang L.
europepmc   +1 more source

Testing isomorphism of lattices over CM-orders

open access: yes, 2019
A CM-order is a reduced order equipped with an involution that mimics complex conjugation. The Witt-Picard group of such an order is a certain group of ideal classes that is closely related to the "minus part" of the class group.
Lenstra Jr., Hendrik W.   +1 more
core  

Home - About - Disclaimer - Privacy