军事学 >>> 军事学
搜索结果: 1-15 共查到军事学 Ntru相关记录47条 . 查询时间(0.031 秒)
A Simple Key Reuse Attack on Ntru Cryptosystem     Lattice  Encryption  Ntru  Cryptanalysis  KEM       font style='font-size:12px;'> 2019/9/16
In 1998, Jerey Hostein, Jill Pipher, and Joseph H. Silverman introduced the famous Ntru cryptosystem, and called it "A ring-based public key cryptosystem". Actually it turns out to be a lattice based ...
Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15     NTRUReEncrypt  NTRU  Decryption Failure       font style='font-size:12px;'> 2019/1/29
In ASIACCS 2015, Nuñez, Agudo, and Lopez proposed a proxy re-encryption scheme, NTRUReEncrypt, based on NTRU, which allows a proxy to translate ciphertext under the delegator's public key into a ...
Hard learning problems are central topics in recent cryptographic research. Many cryptographic primitives relate their security to difficult problems in lattices, such as the shortest vector problem. ...
NTRU lattices are a class of polynomial rings which allow for compact and efficient representations of the lattice basis, thereby offering very good performance characteristics for the asymmetric algo...
A Comparison of NTRU Variants     Post-quantum crypto  NTRU       font style='font-size:12px;'> 2018/12/3
We analyze the size vs. security trade-offs that are available when selecting parameters for perfectly correct key encapsulation mechanisms based on NTRU.
Can Bob give Alice his decryption secret and be convinced that she will not give it to someone else? This is achieved by a proxy re-encryption scheme where Alice does not have Bob’s secret but instead...
Characterizing overstretched NTRU attacks     lattice techniques  overstretched NTRU  subfield attack       font style='font-size:12px;'> 2018/6/27
Overstretched NTRU, an NTRU variant with a large modulus, has been used as a building block for several cryptographic schemes in recent years. Recently, two lattice subfield attacks and a subring atta...
CRPSF and NTRU Signatures over cyclotomic fields     NTRU  Ideal lattice  Canonical embedding       font style='font-size:12px;'> 2018/5/16
We propose a detailed construction of Collision Resistance Preimage Sampleable Functions ((CRPSF)) over any cyclotomic field based on NTRU, hence give a provably secure NTRU Signature scheme ((NTRUSig...
In this paper, we propose cryptanalyses of all existing indistinguishability obfuscation (iO) candidates based on branching programs (BP) over GGH13 multilinear map. To achieve this, we introduce two ...
Estimate all the {LWE, NTRU} schemes!     post-quantum cryptography  public-key cryptography  cryptanalysis       font style='font-size:12px;'> 2018/4/11
We consider all LWE- and NTRU-based encryption, key encapsulation, and digital signature schemes proposed for standardisation as part of the Post-Quantum Cryptography process run by the US National In...
In this paper, we propose NTRU-LPR IND-CPA, a new secure scheme based on the decisional variant of Bounded Distance Decoding problem over rings (DR-BDD). This scheme is IND-CPA secure and has two KEM ...
An identity-based encryption scheme enables the efficient distribution of keys in a multi-user system. Such schemes are particularly attractive in resource constrained environments where critical reso...
Choosing Parameters for the Subfield Lattice Attack against overstretched NTRU     NTRU  smaller modulus       font style='font-size:12px;'> 2017/10/9
Albrecht et al. at Crypto 2016 and Cheon et al. at ANTS 2016 independently presented a subfield attack on overstretched NTRU problem. Their idea is to map the public key down to the subfield (by norm ...
High-speed key encapsulation from NTRU     Post-quantum crypto  lattice-based crypto  NTRU       font style='font-size:12px;'> 2017/7/6
This paper presents software demonstrating that the 20-year-old NTRU cryptosystem is competitive with more recent lattice-based cryptosystems in terms of speed, key size, and ciphertext size. We prese...
The overstretched NTRU problem, which is the NTRU problem with super-polynomial size q in n, is one of the important security foundation of cryptosystems which are recently suggested. Albrecht et al. ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...