2022 Interdisciplinary Research in Technology and Management (IRTM) 2022
DOI: 10.1109/irtm54583.2022.9791580
|View full text |Cite
|
Sign up to set email alerts
|

Secured and Quantum Resistant Key Exchange Cryptography Methods – A Comparison

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…NTRU protocol uses the rationale of the lattice-based SVP and is chosen due to the high security, speed and less complexity it provides. As far as the available data are concerned, NTRU has more strength in relation to RSA concerning quantum attacks (Bansod et al 2022). NTRU is based on the rationale of smallest vector in lattices and its related operations are based on tailless polynomial convolution ring which encompasses integer coefficient having N maximum degree.…”
Section: Robustness and Complexity Analysismentioning
confidence: 99%
See 3 more Smart Citations
“…NTRU protocol uses the rationale of the lattice-based SVP and is chosen due to the high security, speed and less complexity it provides. As far as the available data are concerned, NTRU has more strength in relation to RSA concerning quantum attacks (Bansod et al 2022). NTRU is based on the rationale of smallest vector in lattices and its related operations are based on tailless polynomial convolution ring which encompasses integer coefficient having N maximum degree.…”
Section: Robustness and Complexity Analysismentioning
confidence: 99%
“…NTRU is based on the rationale of smallest vector in lattices and its related operations are based on tailless polynomial convolution ring which encompasses integer coefficient having N maximum degree. Concerning a Z polynomial with variable X, the R ring is scrimped up to N-1 as shown below (Bansod et al 2022):…”
Section: Robustness and Complexity Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…The future evolution of this field will be determined by how these new algorithms are developed and how their procedures become world-standard cryptographic protocols. The shift towards quantum-cold cryptology is a considerable endeavor that involves large-scale upgrades to our current technology infrastructures and collaborative participation from multiple industries [5,6].…”
Section: Quantum-resistant Cryptographymentioning
confidence: 99%