Please use this identifier to cite or link to this item:
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/15658
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Nisha, F | - |
dc.contributor.author | Lenin, J | - |
dc.contributor.author | Saravanan, S K | - |
dc.contributor.author | Rohit, V Robin | - |
dc.contributor.author | Selvam, P D | - |
dc.contributor.author | Rajmohan, M | - |
dc.date.accessioned | 2024-05-29T08:51:27Z | - |
dc.date.available | 2024-05-29T08:51:27Z | - |
dc.date.issued | 2024 | - |
dc.identifier.citation | pp. 509-514 | en_US |
dc.identifier.isbn | 9798350349856 | - |
dc.identifier.uri | http://dx.doi.org/10.1109/ESIC60604.2024.10481608 | - |
dc.identifier.uri | http://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/15658 | - |
dc.description.abstract | The quantum-resistant qualities of various encryption methods, such as N-th degree Truncated polynomial Ring Units (NTRU) Encrypt, NTRU Sign, Ring-Lizard, and Kyber protocols are becoming more important in light of the ever-evolving nature of digital threats. An-depth analysis of the mathematical derivation of these algorithms, as well as a determination of their computing efficiency and resistance to quantum assaults is discussed in this paper. Techniques of the Ring-Lizard and Kyber algorithms to lattice-based encryption are analyzed. The study gives an overview of quantum-resistant capabilities of these algorithms and their performance measures. Strengths and weaknesses of the NTRU Encrypt, NTRU Sign, Ring-Lizard, and Kyber algorithms are discussed. The results give useful insights for cybersecurity practitioners, academics, and policymakers, aiding them in making educated choices to protect digital infrastructures against quantum attacks. © 2024 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.publisher | ESIC - 4th International Conference on Emerging Systems and Intelligent Computing, Proceedings | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.subject | Cryptographic Security | en_US |
dc.subject | Encryption Algorithms | en_US |
dc.subject | Kyber Algorithm | en_US |
dc.subject | Lattice-Based Cryptography | en_US |
dc.subject | Nth Degree Truncated Polynomial Ring Encryption | en_US |
dc.subject | Nth Degree Truncated Polynomial Ring Sign | en_US |
dc.subject | Quantum Computing | en_US |
dc.subject | Quantum-Resistant | en_US |
dc.subject | Ring-Lizard Algorithm | en_US |
dc.subject | Secure Communications | en_US |
dc.title | Lattice-Based Cryptography and Ntru: Quantum-Resistant Encryption Algorithms | en_US |
dc.type | Article | en_US |
Appears in Collections: | Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.