2023
DOI: 10.1007/978-3-031-40003-2_12
|View full text |Cite
|
Sign up to set email alerts
|

NTWE: A Natural Combination of NTRU and LWE

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
0
0
1

Year Published

2024
2024
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 17 publications
0
0
0
1
Order By: Relevance
“…The implementation of algorithms in strict accordance with Formula (5) also practically prevents attacks based on known signatures; however, using Formula (9) allows you to include multipliers equal to various degrees of the secret vector P in formulas for calculating elements of the public key, the presence of which is aimed at ensuring resistance to attacks using the search for potential equivalent keys. At the same time, the security level to a direct attack (calculation of secret vectors based on public-key elements) increases due to the appearance of additional square vector equations in the system of equations written in accordance with Formulas (7) and (8). The system of square vector equations considered in a direct attack has the following form:…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The implementation of algorithms in strict accordance with Formula (5) also practically prevents attacks based on known signatures; however, using Formula (9) allows you to include multipliers equal to various degrees of the secret vector P in formulas for calculating elements of the public key, the presence of which is aimed at ensuring resistance to attacks using the search for potential equivalent keys. At the same time, the security level to a direct attack (calculation of secret vectors based on public-key elements) increases due to the appearance of additional square vector equations in the system of equations written in accordance with Formulas (7) and (8). The system of square vector equations considered in a direct attack has the following form:…”
Section: Discussionmentioning
confidence: 99%
“…Thus, the post-quantum cryptography should be based on computationally complex problems other than DLP and FP. For example, post-quantum public-key cryptographic algorithms on groups [7], algebraic lattices [8], codes [9], and hash functions [10] have been proposed.…”
Section: Introductionmentioning
confidence: 99%
“…Известны постквантовые двухключевые алгоритмы на группах [3], кодах [4,5], алгебраических решетках [6,7], хеш-функциях [8], булевых функциях [9], трудно обратимых отображениях [10,11] и некоммутативных алгебрах [12,13]. Обращают на себя внимание алгоритмы, основанные на трудно обратимых нелинейных отображениях с секретной лазейкой.…”
Section: Introductionunclassified