Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

Lei

biblio

Visible to the public Security weakness of a lattice-based key exchange protocol

Submitted by aekwall on Mon, 08/26/2019 - 10:07am
  • Protocols
  • Metrics
  • MITM Attack
  • network security field
  • nonDH type key exchange protocol
  • NTRU-ENCRYPT
  • NTRU-KE
  • NTRU-SIGN
  • policy-based governance
  • private key cryptography
  • man-in-the-middle attack
  • pubcrawl
  • public key cryptography
  • quantum attacks
  • quantum computing
  • resilience
  • Resists
  • Secret key
  • security weaknesses
  • telecommunication security
  • Human behavior
  • Computing Technology
  • cryptanalysis
  • Cryptographic Protocols
  • DH problem
  • DH-HEMTs
  • Diffie-Hellman problem
  • digital signatures
  • exponential attacks
  • grid computing
  • authentication mechanism
  • information field
  • information technology
  • Key exchange
  • lattice cryptography
  • lattice-based key exchange protocol
  • Lattices
  • Lei
  • Liao

Terms of Use  |  ©2023. CPS-VO