Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » Tags cloud » Public Key

Journals

  • IJIEC (678)
  • MSL (2637)
  • DSL (606)
  • CCL (460)
  • USCM (1087)
  • ESM (391)
  • AC (543)
  • JPM (215)
  • IJDS (802)
  • JFS (81)

Keywords

Supply chain management(156)
Jordan(154)
Vietnam(147)
Customer satisfaction(119)
Performance(108)
Supply chain(105)
Service quality(95)
Tehran Stock Exchange(94)
Competitive advantage(91)
SMEs(85)
optimization(81)
Financial performance(81)
Job satisfaction(78)
Factor analysis(78)
Trust(77)
Knowledge Management(76)
Genetic Algorithm(74)
TOPSIS(73)
Social media(72)
Organizational performance(71)


» Show all keywords

Authors

Naser Azad(82)
Mohammad Reza Iravani(64)
Zeplin Jiwa Husada Tarigan(52)
Endri Endri(44)
Muhammad Alshurideh(40)
Hotlan Siagian(36)
Muhammad Turki Alshurideh(35)
Jumadil Saputra(35)
Barween Al Kurdi(32)
Hassan Ghodrati(31)
Mohammad Khodaei Valahzaghard(30)
Ahmad Makui(30)
Dmaithan Almajali(30)
Ni Nyoman Kerti Yasa(29)
Basrowi Basrowi(29)
Shankar Chakraborty(29)
Prasadja Ricardianto(28)
Sulieman Ibraheem Shelash Al-Hawary(27)
Ali Harounabadi(26)
Haitham M. Alzoubi(26)


» Show all authors

Countries

Iran(2149)
Indonesia(1208)
India(762)
Jordan(726)
Vietnam(489)
Malaysia(415)
Saudi Arabia(400)
United Arab Emirates(209)
Thailand(142)
China(130)
United States(100)
Turkey(97)
Ukraine(93)
Egypt(86)
Canada(83)
Pakistan(81)
Nigeria(72)
Peru(70)
United Kingdom(69)
Taiwan(65)


» Show all countries
Sort articles by: Volume | Date | Most Rates | Most Views | Reviews | Alphabet
1.

A novel security analysis for a new NTRU variant with additional private key Pages 765-780 Right click to download the paper Download PDF

Authors: Nurshamimi Salleh, Hailiza Kamarulhaili, Laith Abualigah

DOI: 10.5267/j.ijdns.2023.2.001

Keywords: NTRU, Private Key, Public Key, Encryption, Decryption

Abstract:
This paper proposes a new variant of NTRU with a slightly different critical formulation. The significance of this new variant is that it requires an additional private key to provide a tighter scheme. Because of these changes, modified key generation, encryption and decryption algorithms have been developed accordingly. The new variant is analyzed and tested against several well-known attacks, namely the alternate private key attack, brute force attack, meet-in-the-middle attack, multiple transmission attacks and lattice attack. Security properties related to these attacks have been established and explored to ensure the new variant is secure against the said attacks. Several examples are provided to illustrate the ideas.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2023 | Volume: 7 | Issue: 2 | Views: 614 | Reviews: 0

 

® 2010-2025 GrowingScience.Com