2011 International Conference on Communication Systems and Network Technologies 2011
DOI: 10.1109/csnt.2011.23
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative Analysis & Enhancement of NTRU Algorithm for Network Security and Performance Improvement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 5 publications
0
7
0
Order By: Relevance
“…Polynomials are added in the usual way. They are also multiplied more-or-less as usual, except that X N is replaced by 1, X N +1 is replaced by X, X N +2 is replaced by X 2 , and so on [24,25,26,27].…”
Section: Fig 11 Heterogeneous Nodes In An Oppnetmentioning
confidence: 99%
“…Polynomials are added in the usual way. They are also multiplied more-or-less as usual, except that X N is replaced by 1, X N +1 is replaced by X, X N +2 is replaced by X 2 , and so on [24,25,26,27].…”
Section: Fig 11 Heterogeneous Nodes In An Oppnetmentioning
confidence: 99%
“…Min et al [16] proposed a NTRUSign algorithm of ductility attack methods: an attacker by active eavesdropping, after receiving a message with the signature of the legal cases, able to forge a multiple legal signature of the message; At the same time give a repair defects of ductility MYK-NTRUSign digital signature algorithm. [17] In this paper, we employed the MYK-NTRUSign signature algorithm [18] [19] in combination with symmetric encryption algorithm (AES) and hash techniques (e.g. MD5 or SHA) to construct our new mutual authentication and session key agreement protocol appropriate for wireless communications.…”
Section: Introductionmentioning
confidence: 99%
“…Then the original message can be computed by m = fq * a (mod q). [10] IV. THE PROPOSED METHOD In this method the sender and receiver agree upon four steps of scrambling to the sound, according to random arrays that will be generated and encrypted by the sender and sent to the receiver in a metadata file.…”
Section: Decryptionmentioning
confidence: 99%
“…NTRU depends on 3 integer parameter (N, p, q), where N is a prime integer, p and q are relatively prime integers and q is larger than p. [10] www.ijacsa.thesai.org…”
Section: A Prametersmentioning
confidence: 99%