This paper presents software demonstrating that the 20-year-old NTRU cryptosystem is competitive with more recent lattice-based cryptosystems in terms of speed, key size, and ciphertext size. We present a slightly simplified version of textbook NTRU, select parameters for this encryption scheme that target the 128-bit post-quantum security level, construct a KEM that is CCA2-secure in the quantum random oracle model, and present highly optimized software targeting Intel CPUs with the AVX2 vector instruction set. This software takes only 307 914 cycles for the generation of a keypair, 48 646 for encapsulation, and 67 338 for decapsulation. It is, to the best of our knowledge, the first NTRU software with full protection against timing attack...
The dawning era of quantum computing has initiated various initiatives for the standardization of po...
Several ideal-lattice-based cryptosystems have been broken by recent attacks that exploit special st...
Several ideal-lattice-based cryptosystems have been broken by recent attacks that exploit special st...
This paper presents software demonstrating that the 20-year-old NTRU cryptosystem is competitive wit...
This paper presents software demonstrating that the 20-year-old NTRU cryptosystem is competitive wit...
This paper presents software demonstrating that the 20-year-old NTRU cryptosystem is competitive wit...
This paper presents software demonstrating that the 20-year-old NTRU cryptosystem is competitive wit...
\u3cp\u3eThis paper presents software demonstrating that the 20-year-old NTRU cryptosystem is compet...
This paper presents software demonstrating that the 20-year-old NTRU cryptosystem is competitive wit...
We present NTTRU – an IND-CCA2 secure NTRU-based key encapsulation scheme that uses the number theor...
We present NTTRU -- an IND-CCA2 secure NTRU-based key encapsulation scheme that uses the number theo...
International audienceThe fast development of quantum computers represents a risk for secure communi...
peer reviewedThe dawning era of quantum computing has initiated various initiatives for the standard...
The NTRU lattice is a promising candidate to construct practical cryptosystems, in particular key en...
This paper presents a constant time hardware implementation of the NIST round 2 post-quantum cryptog...
The dawning era of quantum computing has initiated various initiatives for the standardization of po...
Several ideal-lattice-based cryptosystems have been broken by recent attacks that exploit special st...
Several ideal-lattice-based cryptosystems have been broken by recent attacks that exploit special st...
This paper presents software demonstrating that the 20-year-old NTRU cryptosystem is competitive wit...
This paper presents software demonstrating that the 20-year-old NTRU cryptosystem is competitive wit...
This paper presents software demonstrating that the 20-year-old NTRU cryptosystem is competitive wit...
This paper presents software demonstrating that the 20-year-old NTRU cryptosystem is competitive wit...
\u3cp\u3eThis paper presents software demonstrating that the 20-year-old NTRU cryptosystem is compet...
This paper presents software demonstrating that the 20-year-old NTRU cryptosystem is competitive wit...
We present NTTRU – an IND-CCA2 secure NTRU-based key encapsulation scheme that uses the number theor...
We present NTTRU -- an IND-CCA2 secure NTRU-based key encapsulation scheme that uses the number theo...
International audienceThe fast development of quantum computers represents a risk for secure communi...
peer reviewedThe dawning era of quantum computing has initiated various initiatives for the standard...
The NTRU lattice is a promising candidate to construct practical cryptosystems, in particular key en...
This paper presents a constant time hardware implementation of the NIST round 2 post-quantum cryptog...
The dawning era of quantum computing has initiated various initiatives for the standardization of po...
Several ideal-lattice-based cryptosystems have been broken by recent attacks that exploit special st...
Several ideal-lattice-based cryptosystems have been broken by recent attacks that exploit special st...