Achievable upper bound for the sup-norm of the elements' product in the ring of truncated polynomials and its application to the analysis of ntru-like cryptosystems
Saved in:
| Date: | 2021 |
|---|---|
| Main Authors: | A. N. Aleksejchuk, A. A. Matijko |
| Format: | Article |
| Language: | English |
| Published: |
2021
|
| Series: | Cybernetics and Systems Analysis |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001221018 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems
by: A. N. Aleksejchuk
Published: (2018)
by: A. N. Aleksejchuk
Published: (2018)
Upper bounds for imbalance of discrete functions realized by sequences of finite-state machines
by: A. N. Aleksejchuk, et al.
Published: (2019)
by: A. N. Aleksejchuk, et al.
Published: (2019)
Security estimates of a Ring-LWE symmetric cryptosystem against chosen plaintext attack
by: S. M. Ignatenko
Published: (2020)
by: S. M. Ignatenko
Published: (2020)
Study of the excitation of 11/2<sup>–</sup> isomeric state of the nucleus <sup>139</sup>Se in reaction (γ,n)<sup>m</sup> in the giant E1-resonance region
by: V. M. Mazur, et al.
Published: (2017)
by: V. M. Mazur, et al.
Published: (2017)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018)
by: Ustimenko, A. A.
Published: (2018)
Investigation of presence of Mn<sup>+4</sup> in welding aerosols
by: O. M. Korduban, et al.
Published: (2021)
by: O. M. Korduban, et al.
Published: (2021)
Оптимізація NTRU подібного алгоритму для несиметричного шифрування з «незручними параметрами»
by: Качко, Олена Григорівна, et al.
Published: (2017)
by: Качко, Олена Григорівна, et al.
Published: (2017)
On new multivariate cryptosystems with nonlinearity gap
by: V. Ustimenko
Published: (2017)
by: V. Ustimenko
Published: (2017)
The Analysis of Difficulty of Realizations of Cryptosystems on Groups
by: H. Z. Khalimov
Published: (2017)
by: H. Z. Khalimov
Published: (2017)
Infinitely improvable upper bounds in the theory of polarons
by: Soldatov, A.V.
Published: (2010)
by: Soldatov, A.V.
Published: (2010)
Code-based Cryptosystem for Post-quantum Application
by: O. O. Kuznetsov, et al.
Published: (2017)
by: O. O. Kuznetsov, et al.
Published: (2017)
Boundary bound states in the Bose–Hubbard-like chain
by: Zvyagin, A.A.
Published: (2007)
by: Zvyagin, A.A.
Published: (2007)
On new multivariate cryptosystems based on hidden Eulerian equations
by: V. A. Ustimenko
Published: (2017)
by: V. A. Ustimenko
Published: (2017)
On separable and \(H\)-separable polynomials in skew polynomial rings of several variables
by: Ikehata, Shuichi
Published: (2018)
by: Ikehata, Shuichi
Published: (2018)
Optimization NTRU Similar Algorithm for Asymmetric Encryption with the "Inconvenient Parameters"
by: O. H. Kachko, et al.
Published: (2017)
by: O. H. Kachko, et al.
Published: (2017)
Hermite–Birkhoff interpolation polynomial of minimum norm in Hilbert space
by: O. F. Kashpur
Published: (2021)
by: O. F. Kashpur
Published: (2021)
Upper bounds on second order operators, acting on metric function
by: Antoniouk, A.V.
Published: (2007)
by: Antoniouk, A.V.
Published: (2007)
On two windows multivariate cryptosystem depending on random parameters
by: U. Romańczuk-Polubiec, et al.
Published: (2015)
by: U. Romańczuk-Polubiec, et al.
Published: (2015)
On two windows multivariate cryptosystem depending on random parameters
by: Romańczuk-Polubiec, U., et al.
Published: (2015)
by: Romańczuk-Polubiec, U., et al.
Published: (2015)
Lie algebras associated with modules over polynomial rings
by: A. P. Petravchuk, et al.
Published: (2017)
by: A. P. Petravchuk, et al.
Published: (2017)
Quasi-duo Partial skew polynomial rings
by: Cortes, Wagner, et al.
Published: (2018)
by: Cortes, Wagner, et al.
Published: (2018)
Spheres over finite rings and their polynomial maps
by: M. Golasinski, et al.
Published: (2013)
by: M. Golasinski, et al.
Published: (2013)
Upper bound of oriented genus of a simple graph gluing
by: V. I. Petreniuk, et al.
Published: (2018)
by: V. I. Petreniuk, et al.
Published: (2018)
Commutative ring extensions defined by perfect-like conditions
by: Alaoui Ismaili, et al.
Published: (2023)
by: Alaoui Ismaili, et al.
Published: (2023)
Integral inequalities of the Hermite – Hadamard type for K-bounded norm convex mappings
by: S. S. Dragomir
Published: (2016)
by: S. S. Dragomir
Published: (2016)
Truncated QCD-pomeron at LHC energies
by: A. Lengyel, et al.
Published: (2013)
by: A. Lengyel, et al.
Published: (2013)
Truncated QCD-pomeron at LHC energies
by: A. Lengyel, et al.
Published: (2013)
by: A. Lengyel, et al.
Published: (2013)
Achievement of correspondence between the terms of logic and norms of modern ukrainian language
by: U. V. Khamar
Published: (2018)
by: U. V. Khamar
Published: (2018)
Upper bound for the diameter of a tree in the quantum graph theory
by: O. P. Boiko, et al.
Published: (2022)
by: O. P. Boiko, et al.
Published: (2022)
On weakly semisimple derivations of the polynomial ring in two variables
by: V. S. Gavran, et al.
Published: (2014)
by: V. S. Gavran, et al.
Published: (2014)
An intellectual information technology for organizational decisions expert-analytical support
by: Ilyina, O.P., et al.
Published: (2025)
by: Ilyina, O.P., et al.
Published: (2025)
Solvable Lie algebras of derivations of polynomial rings in three variables
by: Ie. Yu. Chapovskyi, et al.
Published: (2018)
by: Ie. Yu. Chapovskyi, et al.
Published: (2018)
Upper bound on correlation sum for three indicators under absence of common factor
by: A. S. Balabanov
Published: (2019)
by: A. S. Balabanov
Published: (2019)
Truncation error bounds for branched continued fraction ∑N ai(1) ∑i1 ai(2) ∑i2 ai(3) …
by: T. M. Antonova, et al.
Published: (2020)
by: T. M. Antonova, et al.
Published: (2020)
Supersingular twisted Edwards curves over prime fields.I. Supersingular twisted Edwards curves with ј-invariants 0 and 12<sup>3</sup>
by: A. V. Bessalov, et al.
Published: (2019)
by: A. V. Bessalov, et al.
Published: (2019)
On the equivalence of integral norms on the space of measurable polynomials with respect to a convex measure
by: Berezhnoy, V.
Published: (2008)
by: Berezhnoy, V.
Published: (2008)
Solvable Lie algebras of derivations of polynomial rings in three variables
by: Chapovskyi, Ie. Yu.; Чаповський І. Є.; Київський національний університет ім. Тараса Шевченка, Київ, et al.
Published: (2018)
by: Chapovskyi, Ie. Yu.; Чаповський І. Є.; Київський національний університет ім. Тараса Шевченка, Київ, et al.
Published: (2018)
Supersingular twisted Edwards curves over a simple field. II. supersingular twisted Edwards curves with an j-invariant equal to 66<sup>3</sup>
by: A. V. Bessalov, et al.
Published: (2019)
by: A. V. Bessalov, et al.
Published: (2019)
System psychological sup port for self-realization adolescents by self- development and self-regulation
by: N. V. Tsumarieva
Published: (2013)
by: N. V. Tsumarieva
Published: (2013)
The Truncated Fourier Operator. General Results
by: V. Katsnelson, et al.
Published: (2012)
by: V. Katsnelson, et al.
Published: (2012)
Similar Items
-
Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems
by: A. N. Aleksejchuk
Published: (2018) -
Upper bounds for imbalance of discrete functions realized by sequences of finite-state machines
by: A. N. Aleksejchuk, et al.
Published: (2019) -
Security estimates of a Ring-LWE symmetric cryptosystem against chosen plaintext attack
by: S. M. Ignatenko
Published: (2020) -
Study of the excitation of 11/2<sup>–</sup> isomeric state of the nucleus <sup>139</sup>Se in reaction (γ,n)<sup>m</sup> in the giant E1-resonance region
by: V. M. Mazur, et al.
Published: (2017) -
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018)