搜索结果: 31-45 共查到“军事学 NTRU”相关记录47条 . 查询时间(0.125 秒)
This paper explores some attacks that someone with a Quantum Computer may
be able to perform against NTRUEncrypt, and in particular NTRUEncrypt as
implemented by the publicly available library from ...
Private Proximity Testing on Steroids: An NTRU-based Protocol
Location privacy Cryptographic Protocols Private Equality Testing
2015/12/23
Nowadays, most smartphones come pre-equipped with location
(GPS) sensing capabilities, allowing developers to create a wide variety
of location-aware applications and services. While location awaren...
Characterizing NTRU-Variants Using Group Ring and Evaluating their Lattice Security
NTRU lattice-based cryptography group ring
2015/12/18
The encryption scheme NTRU is designed over a quotient ring of a polynomial
ring. Basically, if the ring is changed to any other ring, NTRU-like cryptosystem
is constructible.
Public key exchange protocol is identified as an important application in the field of public-key cryptography. Most of the existing public key exchange schemes are Diffie-Hellman (DH)-type, whose sec...
An Efficient Broadcast Attack against NTRU
Broadcast attack NTRU GGH derandomization linerization circular matrix
2012/3/22
The NTRU cryptosystem is the most practical scheme known to date. In this paper, we first discuss the ergodic-linearization algorithm against GGH, then naturally deduce a new and uniform broadcast att...
An Efficient Broadcast Attack against NTRU
Broadcast attack NTRU GGH derandomization linerization circular matrix
2012/3/21
The NTRU cryptosystem is the most practical scheme known to date. In this paper, we first discuss the ergodic-linearization algorithm against GGH, then naturally deduce a new and uniform broadcast att...
An Efficient Broadcast Attack against NTRU
Broadcast attack NTRU GGH derandomization linerization circular matrix
2012/6/14
The NTRU cryptosystem is the most practical scheme known to date. In this paper, we first discuss the ergodic-linearization algorithm against GGH, then naturally deduce a new and uniform broadcast att...
Cryptanalysis of NTRU with two public keys
public-key cryptography / NTRU cryptosystem Lattice attacks Cryptanalysis
2012/3/26
NTRU is a fast public key cryptosystem presented in 1996 by Hoffstein, Pipher and Silverman. It operates in the ring of truncated polynomials. In NTRU, a public key is a polynomial defined by the comb...
Lower bounds of shortest vector lengths in random knapsack lattices and random NTRU lattices
public-key cryptography / Shortest vector problem Kolmogorov complexity Knapsack lattice NTRU lattice
2012/3/29
Finding the shortest vector of a lattice is one of the most important problems in computational lattice theory. For a random lattice, one can estimate the length of the shortest vector using the Gauss...
A Broadcast Attack against NTRU Using Ding's Algorithm
Broadcast attack NTRU lattice-based cryptosystems Ding's Algorithm
2010/11/26
Very recently, Ding proposed an ingenious algorithm to solve LWE problem with bounded errors in polynomial time. We find that it can be easily used to give a broadcast attack against NTRU, the most ef...
In order to prevent illegal tracking and stealing
personal or cargo information, the authentication services should
be provided for the tags to identify a Reader. A NTRU based
signature scheme is p...
QTRU: A Lattice Attack Resistant Version of NTRU PKCS Based on Quaternion Algebra
QTRU NTRU quaternion algebra
2009/8/18
We propose QTRU, a probabilistic and multi-dimensional public key cryptosystem based on
the NTRU public key cryptosystem using quaternion algebra. QTRU encrypts four data vectors
in each encryption ...
基于NTRU的3G移动通信认证和密钥分配方案
NTRU公钥密码体制 用户认证 密钥分配
2009/7/21
指出3GPP提出的3G认证和密钥分配方案存在的安全漏洞。针对存在安全问题提出一个基于NTRU公钥密码体制的3G认证和密钥分配方案,该方案中将原认证和分配方案进行明文传输的身份信息与各安全参数用NTRU公钥加密算法进行加密保护,防止了恶意攻击者对身份信息以及安全参数的伪造与篡改,提高了认证和密钥分配方案的安全性和可靠性。同时该方案保持了原认证方案的结构模式,易于从原方案进行扩展实现。由于NTRU公钥...
QTRU: A Lattice Attack Resistant Version of NTRU PKCS Based on Quaternion Algebra
QTRU NTRU quaternion algebra
2009/7/14
We propose QTRU, a probabilistic and multi-dimensional public-key cryptosystem based on
the NTRU public-key cryptosystem using quaternion algebra. QTRU encrypts four data vectors
in each encryption ...
A Note on Cryptanalysis of the Preliminary Version of the NTRU Signature Scheme
Cryptanalysis NTRU Signature Scheme
2009/4/16
In this paper a preliminary version of the NTRU signature scheme is cryptanalyzed. The attack
exploits a correlation between some bits of a signature and coefficients of a secret random polynomial.Th...