Increasing the efficiency of the key generation algorithm for NTRU with the help of the norm field
Conceptually, a signature scheme consists of three steps: private key generation, signature, and authentication. Private key generation in NTRU-based signature schemes on a typical laptop (Intel Core i7-6567U 3.30 GHz) takes a long time (more than one second), while signature and verification take much less time (for example, a thousandths of a second). The current paper deals with providing solutions to reduce the time of private key generation. In this paper, the previous methods are studied and then a new method based on the norm field is introduced and it is shown that the execution time is significantly reduced by using it.
-
On n-A-con-cos Groups and Determination of some 3-A-con-cos Groups
, Fatemeh Mahmudi
Mathematics Interdisciplinary Research, Winter 2021 -
Browse searchable encryption schemes: Classification, methods and recent developments
, *, Reza Alimoradi
Journal Monadi for Cyberspace Security (AFTA), -
The Signless Laplacian Estrada Index of Unicyclic Graphs
Hamid Reza Ellahi, Ramin Nasiri, GholamHossein Fath Tabar, *
Mathematics Interdisciplinary Research, Autumn 2017