Security estimates of a Ring-LWE symmetric cryptosystem against chosen plaintext attack
Saved in:
| Date: | 2020 |
|---|---|
| Main Author: | S. M. Ignatenko |
| Format: | Article |
| Language: | English |
| Published: |
2020
|
| Series: | Cybernetics and Systems Analysis |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001103882 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems
by: A. N. Aleksejchuk
Published: (2018)
by: A. N. Aleksejchuk
Published: (2018)
Оценки стойкости симметричной шифрсистемы Ring-LWE относительно атаки с выбранным открытым текстом
by: Игнатенко, С.М.
Published: (2020)
by: Игнатенко, С.М.
Published: (2020)
Security of Poseidon hash function against non-binary differential and linear attacks
by: L. Kovalchuk, et al.
Published: (2021)
by: L. Kovalchuk, et al.
Published: (2021)
Security of Poseidon hash function against non-binary differential and linear attacks
by: Kovalchuk, L., et al.
Published: (2021)
by: Kovalchuk, L., et al.
Published: (2021)
Time has chosen us…
by: S. Yermolenko
Published: (2017)
by: S. Yermolenko
Published: (2017)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Security Justification for Strumok Stream Cipher Against Correlation Attacks Over Finite Fields of Characteristic 2
by: A. M. Oleksiichuk, et al.
Published: (2019)
by: A. M. Oleksiichuk, et al.
Published: (2019)
Genetic algorithm for SDN protection against network attacks
by: S. I. Zabelin
Published: (2016)
by: S. I. Zabelin
Published: (2016)
A model of control for counterac-ting against information attacks in cyberspace
by: A. A. Shyian, et al.
Published: (2021)
by: A. A. Shyian, et al.
Published: (2021)
Amount of key information contained in open and encrypted text sets of the symmetric randomized mceliece cryptosystem
by: S. V. Mitin
Published: (2020)
by: S. V. Mitin
Published: (2020)
Generalized symmetric rings
by: Kafkas, G., et al.
Published: (2018)
by: Kafkas, G., et al.
Published: (2018)
On a common generalization of symmetric rings and quasi duo rings
by: Subedi, T., et al.
Published: (2020)
by: Subedi, T., et al.
Published: (2020)
A method for security evaluation of SNOW 2.0-like ciphers against correlation attacks over finite extensions of the field of two elements
by: A. N. Aleksejchuk, et al.
Published: (2020)
by: A. N. Aleksejchuk, et al.
Published: (2020)
On new multivariate cryptosystems with nonlinearity gap
by: V. Ustimenko
Published: (2017)
by: V. Ustimenko
Published: (2017)
The Analysis of Difficulty of Realizations of Cryptosystems on Groups
by: H. Z. Khalimov
Published: (2017)
by: H. Z. Khalimov
Published: (2017)
On new multivariate cryptosystems with nonlinearity gap
by: Ustimenko, V.
Published: (2017)
by: Ustimenko, V.
Published: (2017)
A three-layer defense mechanism based on web servers against distributed denial of service attacks
by: A. T. Rakhmanov, et al.
Published: (2019)
by: A. T. Rakhmanov, et al.
Published: (2019)
Composition of the chosen landscape parks of the 19th Century in Silesia region of Poland
by: K. M. Rostanski
Published: (2000)
by: K. M. Rostanski
Published: (2000)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A.A.
Published: (2005)
by: Ustimenko, A.A.
Published: (2005)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018)
by: Ustimenko, A. A.
Published: (2018)
Code-based Cryptosystem for Post-quantum Application
by: O. O. Kuznetsov, et al.
Published: (2017)
by: O. O. Kuznetsov, et al.
Published: (2017)
Symmetric modules over their endomorphism rings
by: Ungor, Burcu, et al.
Published: (2015)
by: Ungor, Burcu, et al.
Published: (2015)
Symmetric modules over their endomorphism rings
by: B. Ungor, et al.
Published: (2015)
by: B. Ungor, et al.
Published: (2015)
Symmetric modules over their endomorphism rings
by: Ungor, B., et al.
Published: (2015)
by: Ungor, B., et al.
Published: (2015)
Tourism as important regional development factor (on the example of the chosen region in Slovak Republic)
by: Ja. Gburova, et al.
Published: (2014)
by: Ja. Gburova, et al.
Published: (2014)
Dialogs about press: chosen from correspondence of Osyp Makovei and Vasyl Lukych
by: R. Romaniuk
Published: (2011)
by: R. Romaniuk
Published: (2011)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
On two windows multivariate cryptosystem depending on random parameters
by: Romańczuk-Polubiec, U., et al.
Published: (2015)
by: Romańczuk-Polubiec, U., et al.
Published: (2015)
On new multivariate cryptosystems based on hidden Eulerian equations
by: V. A. Ustimenko
Published: (2017)
by: V. A. Ustimenko
Published: (2017)
On two windows multivariate cryptosystem depending on random parameters
by: U. Romańczuk-Polubiec, et al.
Published: (2015)
by: U. Romańczuk-Polubiec, et al.
Published: (2015)
On new multivariate cryptosystems based on hidden Eulerian equations
by: Ustimenko, V.A.
Published: (2017)
by: Ustimenko, V.A.
Published: (2017)
Skew PBW extensions over symmetric rings
by: Reyes, A., et al.
Published: (2021)
by: Reyes, A., et al.
Published: (2021)
Skew PBW extensions over symmetric rings
by: Reyes, A., et al.
Published: (2021)
by: Reyes, A., et al.
Published: (2021)
Some commutativity criteria for prime rings with involution involving symmetric and skew symmetric elements
by: Dar, N. A., et al.
Published: (2023)
by: Dar, N. A., et al.
Published: (2023)
Some commutativity criteria for prime rings with involution involving symmetric and skew symmetric elements
by: N. A. Dar, et al.
Published: (2023)
by: N. A. Dar, et al.
Published: (2023)
Symmetric information exchange system based on ring isomorphism
by: S. L. Kryvyi, et al.
Published: (2022)
by: S. L. Kryvyi, et al.
Published: (2022)
Achievable upper bound for the sup-norm of the elements' product in the ring of truncated polynomials and its application to the analysis of ntru-like cryptosystems
by: A. N. Aleksejchuk, et al.
Published: (2021)
by: A. N. Aleksejchuk, et al.
Published: (2021)
Symmetric matrices and matrix equations over rings of quasipolynomials with involution
by: V. R. Zelisko, et al.
Published: (2013)
by: V. R. Zelisko, et al.
Published: (2013)
Similar Items
-
Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems
by: A. N. Aleksejchuk
Published: (2018) -
Оценки стойкости симметричной шифрсистемы Ring-LWE относительно атаки с выбранным открытым текстом
by: Игнатенко, С.М.
Published: (2020) -
Security of Poseidon hash function against non-binary differential and linear attacks
by: L. Kovalchuk, et al.
Published: (2021) -
Security of Poseidon hash function against non-binary differential and linear attacks
by: Kovalchuk, L., et al.
Published: (2021) -
Time has chosen us…
by: S. Yermolenko
Published: (2017)