نتایج جستجو برای: ntru

تعداد نتایج: 255  

Journal: :International Journal of Computer Applications 2016

Journal: :Scalable Computing: Practice and Experience 2019

Journal: :International Journal of Computer Applications Technology and Research 2013

Journal: :International Journal of Engineering Research and Advanced Technology 2019

Journal: :Mathematical Problems in Engineering 2021

Fully homomorphic encryption (FHE) supports arbitrary computations on ciphertexts without decryption to protect users’ privacy. However, currently, there are still some shortcomings in research studies FHE. For example, the NTRU-based FHE scheme constructed using approximate eigenvector method requires complex matrix multiplications, and power-of-two cyclotomic ring cannot prevent subfield atta...

Journal: :IEEE Trans. Computers 2003
Colleen O'Rourke Berk Sunar

In this paper, we propose a new unified architecture that utilizes the Montgomery Multiplication algorithm to perform a modular multiplication for both integers and binary polynomials and NTRU’s polynomial multiplications. The unified design is capable of supporting a majority of public-key cryptosystems such as NTRU, RSA, Diffie-Hellman key exchange, and Elliptic Curve schemes, among others. F...

2014
Yarkin Doröz Berk Sunar Ghaith Hammouri

We present a private information retrieval (PIR) scheme based on somewhat homomorphic encryption (SWHE). In particular, we customize an NTRU-based SWHE scheme in order to evaluate a specific class of fixed depth circuits relevant for PIR implementation, thus achieving a more practical implementation. In practice, a SWHE that can evaluate a depth 5 circuit is sufficient to construct a PIR capabl...

Journal: :IACR Cryptology ePrint Archive 2016
Martin R. Albrecht Shi Bai Léo Ducas

The subfield attack exploits the presence of a subfield to solve overstretched versions of the NTRU assumption: norming the public key h down to a subfield may lead to an easier lattice problem and any sufficiently good solution may be lifted to a short vector in the full NTRU-lattice. This approach was originally sketched in a paper of Gentry and Szydlo at Eurocrypt’02 and there also attribute...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید