Cargando…

Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism

In this article, we propose a double-NTRU (D-NTRU)-based key encapsulation mechanism (KEM) for the key agreement requirement of the post-quantum world. The proposed KEM is obtained by combining one-way D-NTRU encryption and Dent’s KEM design method. The main contribution of this article is to constr...

Descripción completa

Detalles Bibliográficos
Autores principales: Seyhan, Kübra, Akleylek, Sedat
Formato: Online Artículo Texto
Lenguaje:English
Publicado: PeerJ Inc. 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10280421/
https://www.ncbi.nlm.nih.gov/pubmed/37346686
http://dx.doi.org/10.7717/peerj-cs.1391