NTRU prime: reducing attack surface at low cost

DJ Bernstein, C Chuengsatiansup, T Lange… - Selected Areas in …, 2018 - Springer
Several ideal-lattice-based cryptosystems have been broken by recent attacks that exploit
special structures of the rings used in those cryptosystems. The same structures are also …

High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers

T Pöppelmann, T Oder, T Güneysu - International conference on …, 2015 - Springer
Over the last years lattice-based cryptography has received much attention due to versatile
average-case problems like Ring-LWE or Ring-SIS that appear to be intractable by quantum …

High-performance and lightweight lattice-based public-key encryption

J Buchmann, F Göpfert, T Güneysu, T Oder… - Proceedings of the 2nd …, 2016 - dl.acm.org
In the emerging Internet of Things, lightweight public-key cryptography is an essential
component for many cost-efficient security solutions. Since conventional public-key …

[PDF][PDF] Blockchain privacy protection based on post quantum threshold algorithm

F Wu, B Zhou, J Jiang, T Lei, J Song - Comput Mater Contin, 2023 - cdn.techscience.cn
With the rapid increase in demand for data trustworthiness and data security, distributed
data storage technology represented by blockchain has received unprecedented attention …

Portable implementation of lattice-based cryptography using JavaScript

Y Yuan, CM Cheng, S Kiyomoto, Y Miyake… - International journal of …, 2016 - jstage.jst.go.jp
In recent years, lattice-based cryptography has attracted a high degree of attention in the
cryptologic research community. It is expected to be in wide use in the foreseeable future …

Comparison between subfield and straightforward attacks on NTRU

P Kirchner, PA Fouque - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Recently in two independent papers, Albrecht, Bai and Ducas and Cheon, Jeong and Lee
presented two very similar attacks, that allow to break NTRU with larger parameters and …

D-NTRU: More efficient and average-case IND-CPA secure NTRU variant

B Wang, H Lei, Y Hu - Information Sciences, 2018 - Elsevier
NTRU is a fast public key cryptosystem remaining unbroken. However, there is no known
worst-to-average reduction for the original NTRU cryptosystem. Several provably secure …

Provably secure NTRUEncrypt over any cyclotomic field

Y Wang, M Wang - International Conference on Selected Areas in …, 2018 - Springer
NTRUEncrypt is generally recognized as one of candidate encryption schemes for post
quantum cryptography, due to its moderate key sizes, remarkable performance and potential …

Compact-LWE: Enabling practically lightweight public key encryption for leveled IoT device authentication

D Liu, N Li, J Kim, S Nepal - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Leveled authentication allows resource-constrained IoT devices to be authenticated at
different strength levels according to the particular types of communication. To achieve …

Provably secure ntruencrypt over more general cyclotomic rings

Y Yu, G Xu, X Wang - Cryptology ePrint Archive, 2017 - eprint.iacr.org
NTRUEncrypt is a fast and standardized lattice-based public key encryption scheme, but it
lacks a proof of security. Stehle and Steinfeld (EUROCRYPT 2011) first gave a variant of …