Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Lattice‐based cryptosystems in standardisation processes: A survey
The current widely used public‐key cryptosystems are vulnerable to quantum attacks. To
prepare for cybersecurity in the quantum era, some projects have been launched to call for …
prepare for cybersecurity in the quantum era, some projects have been launched to call for …
Ring signatures for deniable AKEM: Gandalf's fellowship
Ring signatures, a cryptographic primitive introduced by Rivest, Shamir and Tauman
(ASIACRYPT 2001), offer signer anonymity within dynamically formed user groups. Recent …
(ASIACRYPT 2001), offer signer anonymity within dynamically formed user groups. Recent …
NTRU+: Compact construction of NTRU using simple encoding method
NTRU was the first practical public key encryption scheme constructed on a lattice over a
polynomial-based ring and has been considered secure against significant cryptanalytic …
polynomial-based ring and has been considered secure against significant cryptanalytic …
Generic models for group actions
J Duman, D Hartmann, E Kiltz, S Kunzweiler… - … Conference on Public …, 2023 - Springer
Abstract We define the Generic Group Action Model (GGAM), an adaptation of the Generic
Group Model to the setting of group actions (such as CSIDH). Compared to a previously …
Group Model to the setting of group actions (such as CSIDH). Compared to a previously …
BAT: Small and fast KEM over NTRU lattices
PA Fouque, P Kirchner… - IACR Transactions on …, 2022 - philosophymindscience.org
We present BAT–an IND-CCA secure key encapsulation mechanism (KEM) that is based on
NTRU but follows an encryption/decryption paradigm distinct from classical NTRU KEMs. It …
NTRU but follows an encryption/decryption paradigm distinct from classical NTRU KEMs. It …
Group action key encapsulation and non-interactive key exchange in the QROM
J Duman, D Hartmann, E Kiltz, S Kunzweiler… - … Conference on the …, 2022 - Springer
In the context of quantum-resistant cryptography, cryptographic group actions offer an
abstraction of isogeny-based cryptography in the Commutative Supersingular Isogeny Diffie …
abstraction of isogeny-based cryptography in the Commutative Supersingular Isogeny Diffie …
NEV: faster and smaller NTRU encryption using vector decoding
J Zhang, D Feng, D Yan - International Conference on the Theory and …, 2023 - Springer
In this paper, we present NEV–a faster and smaller NTRU Encryption using Vector
decoding, which is provably IND-CPA secure in the standard model under the decisional …
decoding, which is provably IND-CPA secure in the standard model under the decisional …
POLKA: Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption
As for any cryptographic algorithm, the deployment of post-quantum CCA-secure public key
encryption schemes may come with the need to be protected against side-channel attacks …
encryption schemes may come with the need to be protected against side-channel attacks …
Double-sided: Tight proofs for guessing games in the quantum random oracle model
J Bao, J Ge, R Xue - Cybersecurity, 2024 - Springer
The semi-classical One-Way to Hiding (SC-O2H) lemma given by Ambainis et al.(CRYPTO
2019) is a crucial technique to solve the reprogramming problem in the quantum random …
2019) is a crucial technique to solve the reprogramming problem in the quantum random …
Compact Encryption based on Module-NTRU problems
The Module-NTRU problem, introduced by Cheon, Kim, Kim, Son (IACR ePrint 2019/1468),
and Chuengsatiansup, Prest, Stehlé, Wallet, Xagawa (ASIACCS'20), generalizes the …
and Chuengsatiansup, Prest, Stehlé, Wallet, Xagawa (ASIACCS'20), generalizes the …