2017 IEEE Conference on Application, Information and Network Security (AINS) 2017
DOI: 10.1109/ains.2017.8270415
|View full text |Cite
|
Sign up to set email alerts
|

NTRU inverse polynomial algorithm based on the LU decomposition method of matrix inversion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…NTRU operations are based on objects in the 𝑅 = 𝑍[𝑋] 𝑋 𝑁 βˆ’1 truncated polynomial ring As a consequence [12], NTRU may achieve high speeds while using little computing resources [13]. The NTRU key generation technique requires computing the modular multiplicative inverse of F modulo p and q [14], making it the first secure public-key cryptosystem that does not depend on factorization or discrete logarithm concerns [15]. Let f, g polynomial of the form:…”
Section: Research Methods Of Ntrumentioning
confidence: 99%
“…NTRU operations are based on objects in the 𝑅 = 𝑍[𝑋] 𝑋 𝑁 βˆ’1 truncated polynomial ring As a consequence [12], NTRU may achieve high speeds while using little computing resources [13]. The NTRU key generation technique requires computing the modular multiplicative inverse of F modulo p and q [14], making it the first secure public-key cryptosystem that does not depend on factorization or discrete logarithm concerns [15]. Let f, g polynomial of the form:…”
Section: Research Methods Of Ntrumentioning
confidence: 99%