2016
DOI: 10.1002/sec.1693
|View full text |Cite
|
Sign up to set email alerts
|

Generalisations of NTRU cryptosystem

Abstract: Since the proposal of NTRU cryptosystem, many variants were proposed by the researcher using different‐different algebraic structure. In this article, we try to explore the existing variants of NTRU cryptosystem with their comparative study. Copyright © 2016 John Wiley & Sons, Ltd.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 26 publications
(11 citation statements)
references
References 58 publications
0
10
0
Order By: Relevance
“…Practically, will be lesser than , therefore key security is fixed by , and individual message security is fixed by . So, the security for a key (both |Lg| and |Lf |) and the message is |Lr | [25].…”
Section: Brute Force Attackmentioning
confidence: 99%
“…Practically, will be lesser than , therefore key security is fixed by , and individual message security is fixed by . So, the security for a key (both |Lg| and |Lf |) and the message is |Lr | [25].…”
Section: Brute Force Attackmentioning
confidence: 99%
“…This system is characterized by a small and simple key structure, high speed, and low memory requirements. Thus, many studies have arisen on NTRU, and its well‐known derivatives are ITRU, CTRU, OTRU, and MaTRU, all having different mathematical infrastructures . There are also key exchange protocols based on NTRU.…”
Section: Introductionmentioning
confidence: 99%
“…Hoffstein, Pipher and Silverman [11] proposed the NTRU (Number Theory Research Unit) public-key cryptosystem. The most prominent feature of NTRU is its high speed in encryption and decryption operations for practical security levels under best known attacks compared with classical public-key cryptosystems such as RSA and ECC [12], [13]. NTRU is also considered to be the most viable post-quantum public-key cryptosystem [14] while classical public-key cryptosystems such as RSA and ECC are insecure in the emergence of quantum computing [15].…”
Section: Introductionmentioning
confidence: 99%