Cargando…
Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism
In this article, we propose a double-NTRU (D-NTRU)-based key encapsulation mechanism (KEM) for the key agreement requirement of the post-quantum world. The proposed KEM is obtained by combining one-way D-NTRU encryption and Dent’s KEM design method. The main contribution of this article is to constr...
Autores principales: | Seyhan, Kübra, Akleylek, Sedat |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10280421/ https://www.ncbi.nlm.nih.gov/pubmed/37346686 http://dx.doi.org/10.7717/peerj-cs.1391 |
Ejemplares similares
-
Modelling and verification of post-quantum key encapsulation mechanisms using Maude
por: García, Víctor, et al.
Publicado: (2023) -
A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions
por: Tuncay, Gökhan, et al.
Publicado: (2023) -
A secure key dependent dynamic substitution method for symmetric cryptosystems
por: Ejaz, Aisha, et al.
Publicado: (2021) -
An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay
por: Wang, Xiaowen, et al.
Publicado: (2023) -
A message recovery attack on multivariate polynomial trapdoor function
por: Ali, Rashid, et al.
Publicado: (2023)