Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE), 2017 2017
DOI: 10.23919/date.2017.7927079
|View full text |Cite
|
Sign up to set email alerts
|

Towards post-quantum security for IoT endpoints with NTRU

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
1
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(28 citation statements)
references
References 9 publications
0
28
0
Order By: Relevance
“…Thus, in (18), the plaintext, mm is revealed. It can be seen that CPKC encryption/decryption procedure (12), (13), (15), works correctly due to (14) holding. Note that the norm of the vector, ( f , g) = f 2 + g 2 = 302928.4 is small compared to √ q = 759250123.0.…”
Section: Example Of Cpkc Encryption/ Decryptionmentioning
confidence: 93%
See 2 more Smart Citations
“…Thus, in (18), the plaintext, mm is revealed. It can be seen that CPKC encryption/decryption procedure (12), (13), (15), works correctly due to (14) holding. Note that the norm of the vector, ( f , g) = f 2 + g 2 = 302928.4 is small compared to √ q = 759250123.0.…”
Section: Example Of Cpkc Encryption/ Decryptionmentioning
confidence: 93%
“…Message, m, meets (35), and random integer, r, is selected from the range defined in (42), (44). Encryption and decryption follow (12), and (13), (15), respectively (see Sections 3.2.1, and 3.2.2). Decryption correctness condition 14is proved for RCPKC.1 in (41).…”
Section: Rcpkc1 Definitionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, it did not address memory optimization, and KEM was not covered. In 2017, Oscar et al [15] presented a method for improving the performance of the NTRUEncryption algorithm in ARM Cortex-M0. To improve the speed of multiplication of polynomials, which consumes the most CPU cycles among operations, the product form [16] was applied to polynomial multiplication to show faster operation than conventional algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…Contrary to RSA and ECC working with big numbers and homomorphic only in one operation, multiplication and addition, respectively, NTRU works with high degree, N, polynomial rings and is homomorphic with respect to both multiplication and addition [11]. These features of NTRU allow its use in various applications, such as authentication for smart cards [12], encryption of user data in smart monitoring systems [13], securing of SMS [14], mutual authentication and key agreement for wireless communications [15], embedded systems including microcontrollers and FPGAs [16], Internet of Things devices [17], and NTRU hardware implementation [18]. The NTRU model expects that the public key is used for encryption only by a public user (sender), whereas the private key is used for decryption by the key's owner (receiver).…”
Section: Introductionmentioning
confidence: 99%