Achievable upper bound for the sup-norm of the elements' product in the ring of truncated polynomials and its application to the analysis of ntru-like cryptosystems
Saved in:
| Date: | 2021 |
|---|---|
| Main Authors: | A. N. Aleksejchuk, A. A. Matijko |
| Format: | Article |
| Language: | English |
| Published: |
2021
|
| Series: | Cybernetics and Systems Analysis |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001221018 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems
by: A. N. Aleksejchuk
Published: (2018)
by: A. N. Aleksejchuk
Published: (2018)
Достижимая верхняя граница sup-нормы произведения элементов кольца усеченных многочленов и ее применение к анализу NTRU-подобных криптосистем
by: Алексейчук, А.Н., et al.
Published: (2021)
by: Алексейчук, А.Н., et al.
Published: (2021)
Sharp upper bounds of norms of functions and their derivatives on classes of functions with given comparison function
by: Kofanov, V. A., et al.
Published: (2011)
by: Kofanov, V. A., et al.
Published: (2011)
Upper bounds for imbalance of discrete functions realized by sequences of finite-state machines
by: A. N. Aleksejchuk, et al.
Published: (2019)
by: A. N. Aleksejchuk, et al.
Published: (2019)
On the upper bound of uniformly bounded solutions
by: Voskresenskii, E. V., et al.
Published: (1994)
by: Voskresenskii, E. V., et al.
Published: (1994)
Security estimates of a Ring-LWE symmetric cryptosystem against chosen plaintext attack
by: S. M. Ignatenko
Published: (2020)
by: S. M. Ignatenko
Published: (2020)
Upper Bounds for Mutations of Potentials
by: Cruz Morales, J.A., et al.
Published: (2013)
by: Cruz Morales, J.A., et al.
Published: (2013)
Study of the excitation of 11/2<sup>–</sup> isomeric state of the nucleus <sup>139</sup>Se in reaction (γ,n)<sup>m</sup> in the giant E1-resonance region
by: V. M. Mazur, et al.
Published: (2017)
by: V. M. Mazur, et al.
Published: (2017)
On the best $L_1$-approximation of truncated powers by algebraic polynomials
by: Nitiema, P. K., et al.
Published: (1998)
by: Nitiema, P. K., et al.
Published: (1998)
Truncation method for countable-point boundary-value problems in the space of bounded number sequences
by: Nedokis, V. A., et al.
Published: (2004)
by: Nedokis, V. A., et al.
Published: (2004)
On two statements of “The scottish book” concerning a ring of bounded polynomial functionals on banach spaces
by: Zagoroclnyuk, A. V., et al.
Published: (1996)
by: Zagoroclnyuk, A. V., et al.
Published: (1996)
Investigation of presence of Mn<sup>+4</sup> in welding aerosols
by: O. M. Korduban, et al.
Published: (2021)
by: O. M. Korduban, et al.
Published: (2021)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A.A.
Published: (2005)
by: Ustimenko, A.A.
Published: (2005)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018)
by: Ustimenko, A. A.
Published: (2018)
On new multivariate cryptosystems with nonlinearity gap
by: V. Ustimenko
Published: (2017)
by: V. Ustimenko
Published: (2017)
The Analysis of Difficulty of Realizations of Cryptosystems on Groups
by: H. Z. Khalimov
Published: (2017)
by: H. Z. Khalimov
Published: (2017)
On new multivariate cryptosystems with nonlinearity gap
by: Ustimenko, V.
Published: (2017)
by: Ustimenko, V.
Published: (2017)
Code-based Cryptosystem for Post-quantum Application
by: O. O. Kuznetsov, et al.
Published: (2017)
by: O. O. Kuznetsov, et al.
Published: (2017)
Infinitely improvable upper bounds in the theory of polarons
by: Soldatov, A.V.
Published: (2010)
by: Soldatov, A.V.
Published: (2010)
Upper Subrings of a Ring
by: Katani, R., et al.
Published: (2001)
by: Katani, R., et al.
Published: (2001)
Upper Subrings of a Ring
by: Katani, R., et al.
Published: (2001)
by: Katani, R., et al.
Published: (2001)
Оптимізація NTRU подібного алгоритму для несиметричного шифрування з «незручними параметрами»
by: Качко, Олена Григорівна, et al.
Published: (2017)
by: Качко, Олена Григорівна, et al.
Published: (2017)
Оптимізація NTRU подібного алгоритму для несиметричного шифрування з "незручними параметрами"
by: Качко, О.Г., et al.
Published: (2017)
by: Качко, О.Г., et al.
Published: (2017)
On new multivariate cryptosystems based on hidden Eulerian equations
by: V. A. Ustimenko
Published: (2017)
by: V. A. Ustimenko
Published: (2017)
On new multivariate cryptosystems based on hidden Eulerian equations
by: Ustimenko, V.A.
Published: (2017)
by: Ustimenko, V.A.
Published: (2017)
Steadiness of polynomial rings
by: Zemlicka, J.
Published: (2010)
by: Zemlicka, J.
Published: (2010)
Weil Representation of a Generalized Linear Group over a Ring of Truncated Polynomials over a Finite Field Endowed with a Second Class Involution
by: Gutiérrez Frez, L., et al.
Published: (2015)
by: Gutiérrez Frez, L., et al.
Published: (2015)
Boundary bound states in the Bose–Hubbard-like chain
by: Zvyagin, A.A.
Published: (2007)
by: Zvyagin, A.A.
Published: (2007)
On two windows multivariate cryptosystem depending on random parameters
by: Romańczuk-Polubiec, U., et al.
Published: (2015)
by: Romańczuk-Polubiec, U., et al.
Published: (2015)
On two windows multivariate cryptosystem depending on random parameters
by: U. Romańczuk-Polubiec, et al.
Published: (2015)
by: U. Romańczuk-Polubiec, et al.
Published: (2015)
Upper bounds on second order operators, acting on metric function
by: Antoniouk, A.V.
Published: (2007)
by: Antoniouk, A.V.
Published: (2007)
Optimization NTRU Similar Algorithm for Asymmetric Encryption with the "Inconvenient Parameters"
by: O. H. Kachko, et al.
Published: (2017)
by: O. H. Kachko, et al.
Published: (2017)
Achievement of correspondence between the terms of logic and norms of modern ukrainian language
by: U. V. Khamar
Published: (2018)
by: U. V. Khamar
Published: (2018)
Upper bound of oriented genus of a simple graph gluing
by: V. I. Petreniuk, et al.
Published: (2018)
by: V. I. Petreniuk, et al.
Published: (2018)
On an upper bound for the number of characteristic values of an operator function
by: Radzievskii, G. V., et al.
Published: (1998)
by: Radzievskii, G. V., et al.
Published: (1998)
An intellectual information technology for organizational decisions expert-analytical support
by: Ilyina, O.P., et al.
Published: (2025)
by: Ilyina, O.P., et al.
Published: (2025)
Commutative ring extensions defined by perfect-like conditions
by: Alaoui Ismaili, K., et al.
Published: (2023)
by: Alaoui Ismaili, K., et al.
Published: (2023)
Commutative ring extensions defined by perfect-like conditions
by: Alaoui Ismaili, et al.
Published: (2023)
by: Alaoui Ismaili, et al.
Published: (2023)
Truncated QCD-pomeron at LHC energies
by: A. Lengyel, et al.
Published: (2013)
by: A. Lengyel, et al.
Published: (2013)
Truncated QCD-pomeron at LHC energies
by: A. Lengyel, et al.
Published: (2013)
by: A. Lengyel, et al.
Published: (2013)
Similar Items
-
Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems
by: A. N. Aleksejchuk
Published: (2018) -
Достижимая верхняя граница sup-нормы произведения элементов кольца усеченных многочленов и ее применение к анализу NTRU-подобных криптосистем
by: Алексейчук, А.Н., et al.
Published: (2021) -
Sharp upper bounds of norms of functions and their derivatives on classes of functions with given comparison function
by: Kofanov, V. A., et al.
Published: (2011) -
Upper bounds for imbalance of discrete functions realized by sequences of finite-state machines
by: A. N. Aleksejchuk, et al.
Published: (2019) -
On the upper bound of uniformly bounded solutions
by: Voskresenskii, E. V., et al.
Published: (1994)