نتایج جستجو برای: ntru

تعداد نتایج: 255  

2014
Amandeep Kaur Gill Charanjit Singh

In these days, Security is necessary for all the applications on the network. Number of mechanisms is used for the purpose of providing the security to many applications. But for the N-Tier architecture there is no such type of mechanism is implemented for security till now. N-tier architecture has number of levels or tier, and for each tier security is essential. For providing the security to ...

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2022

Number <span>theory research unit (NTRU) become the most important of securi-ty in recent, with its modification their variant, this paper search literature and A number studies have examined public key variant development security. In general, prior work is limited to a subset increasing complexity but benefits speed up encryption/ decryption not been fully established. So will be basis ...

Journal: :IACR Transactions on Cryptographic Hardware and Embedded Systems 2019

Journal: :Journal of Cryptographic Engineering 2022

Abstract We present a novel full hardware implementation of Streamlined NTRU Prime, with two variants: high-speed, high-area and slower, low-area implementation. introduce several new techniques that improve performance, including batch inversion for key generation, high-speed schoolbook polynomial multiplier, an NTT multiplier combined CRT map, DSP-free modular reduction method, radix sorting ...

2011
William D. Banks WILLIAM D. BANKS

We discuss three cryptosystems, NTRU , SPIFI , and ENROOT , that are based on the use of polynomials with restricted coefficients.

2015
Amritha Puliadi Premnath Ju-Yeon Jo

............................................................................................................. iii ACKNOWLEDGEMENTS .................................................................................... iv TABLE OF CONTENTS .......................................................................................... v LIST OF TABLES .......................................................

2001
Jeffrey Hoffstein Jill Pipher Joseph H. Silverman

The NTRU Signature Scheme (NSS) with enhanced document encoding and signature verification is described. Three areas of security are investigated: (1) It is proven (under a heuristic assumption) that direct forgery is equivalent to the solution of a closest vector problem, up to constant factor, in an NTRU convolution modular lattice. (2) The probability of forgery using partially preselected v...

Journal: :International Journal of Advanced Computer Science and Applications 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید