-
2
-
-
51249173801
-
On Lovász lattice reduction and the nearest lattice point problem
-
L. Babai On Lovász lattice reduction and the nearest lattice point problem, Combinatorica, vol. 6, 1986, 1-13.
-
(1986)
Combinatorica
, vol.6
, pp. 1-13
-
-
Babai, L.1
-
6
-
-
35248821952
-
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt '01
-
Advances in Cryptology - Asiacrypt '01, Springer-Verlag
-
Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt '01, Advances in Cryptology - Asiacrypt '01, Lecture Notes in Computer Science, Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
-
-
Gentry, C.1
Jonsson, J.2
Stern, J.3
Szydlo, M.4
-
7
-
-
84947222499
-
Cryptanalysis of the Revised NTRU Signature Scheme
-
Advances in Cryptology - Eurocrypt '02, Springer-Verlag
-
C. Gentry, M Szydlo, Cryptanalysis of the Revised NTRU Signature Scheme, Advances in Cryptology - Eurocrypt '02, Lecture Notes in Computer Science, Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
-
-
Gentry, C.1
Szydlo, M.2
-
8
-
-
84958655849
-
Public-key cryptography from lattice reduction problems
-
Proc. CRYPTO '97, Springer-Verlag
-
O. Goldreich, S. Goldwasser, S. Halevi, Public-key cryptography from lattice reduction problems. In Proc. CRYPTO '97, Lect. Notes in Computer Science 1294, Springer-Verlag, 1997, 112-131.
-
(1997)
Lect. Notes in Computer Science
, vol.1294
, pp. 112-131
-
-
Goldreich, O.1
Goldwasser, S.2
Halevi, S.3
-
9
-
-
0038670954
-
Software Implementation of Elliptic Curve Cryptography over Binary Fields
-
Cryptographic Hardware and Embedded Systems - CHES 2000, C. K. Koc and C. Paar (eds), Springer-Verlag
-
D. Hankerson, J. L. Hernandez, A. Menezes, Software Implementation of Elliptic Curve Cryptography over Binary Fields, Cryptographic Hardware and Embedded Systems - CHES 2000, LNCS 1965, C. K. Koc and C. Paar (eds), Springer-Verlag, 2000, 1-19.
-
(2000)
LNCS
, vol.1965
, pp. 1-19
-
-
Hankerson, D.1
Hernandez, J.L.2
Menezes, A.3
-
10
-
-
84947808606
-
NTRU: A new high speed public key cryptosystem
-
Algorithmic Number Theory (ANTS III), Portland, OR, June 1998, (J. P. Buhler, ed.), Springer-Verlag, Berlin
-
J. Hoffstein, J. Pipher, J. H. Silverman, NTRU: A new high speed public key cryptosystem, in Algorithmic Number Theory (ANTS III), Portland, OR, June 1998, Lecture Notes in Computer Science 1423 (J. P. Buhler, ed.), Springer-Verlag, Berlin, 1998, 267-288.
-
(1998)
Lecture Notes in Computer Science
, vol.1423
, pp. 267-288
-
-
Hoffstein, J.1
Pipher, J.2
Silverman, J.H.3
-
12
-
-
38049018110
-
NSS: An NTRU Lattice-Based Signature Scheme
-
Advances in Cryptology - Eurocrypt '01, Springer-Verlag
-
J. Hoffstein, J. Pipher, J. H. Silverman, NSS: An NTRU Lattice-Based Signature Scheme, Advances in Cryptology - Eurocrypt '01, Lecture Notes in Computer Science, Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
-
-
Hoffstein, J.1
Pipher, J.2
Silverman, J.H.3
-
13
-
-
84944331475
-
Polynomial Rings and Efficient Public Key Authentication
-
Hong Kong, (M. Blum and C. H. Lee, eds.), City University of Hong Kong Press
-
J. Hoffstein, D. Lieman, J. H. Silverman, Polynomial Rings and Efficient Public Key Authentication, in Proceeding of the International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC '99), Hong Kong, (M. Blum and C. H. Lee, eds.), City University of Hong Kong Press.
-
Proceeding of the International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC '99)
-
-
Hoffstein, J.1
Lieman, D.2
Silverman, J.H.3
-
14
-
-
84945140617
-
Polynomial Rings and Efficient Public Key Authentication II
-
(I. Shparlinski, ed.), Birkhauser
-
J. Hoffstein, J. H. Silverman, Polynomial Rings and Efficient Public Key Authentication II, in Proceedings of a Conference on Cryptography and Number Theory (CCNT '99), (I. Shparlinski, ed.), Birkhauser.
-
Proceedings of a Conference on Cryptography and Number Theory (CCNT '99)
-
-
Hoffstein, J.1
Silverman, J.H.2
-
15
-
-
0000653210
-
Selecting Cryptographic Key Sizes
-
A. K. Lenstra, E. R. Verheul, Selecting Cryptographic Key Sizes, Journal of Cryptology vol. 14, no. 4, 2001, 255-293.
-
(2001)
Journal of Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
16
-
-
35248862861
-
-
University of Turku, private communication
-
T. Meskanen and A. Renvall, University of Turku, private communication.
-
-
-
Meskanen, T.1
Renvall, A.2
-
17
-
-
84958959970
-
Dimension reduction methods for convolution modular lattices
-
Cryptography and Lattices Conference (CaLC 2001), J. H. Silverman (ed.), Springer-Verlag
-
A. May, J. H. Silverman, Dimension reduction methods for convolution modular lattices, in Cryptography and Lattices Conference (CaLC 2001), J. H. Silverman (ed.), Lecture Notes in Computer Science 2146, Springer-Verlag, 2001
-
(2001)
Lecture Notes in Computer Science
, vol.2146
-
-
May, A.1
Silverman, J.H.2
-
18
-
-
84957089305
-
Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97
-
Advances in Cryptology - Proceedings of CRYPTO '99, August 15-19, Santa Barbara, California, M. Wiener (ed.), Springer-Verlag
-
P. Nguyen, Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97, Advances in Cryptology - Proceedings of CRYPTO '99, (August 15-19, 1999, Santa Barbara, California), M. Wiener (ed.), Lecture Notes in Computer Science, Springer-Verlag.
-
(1999)
Lecture Notes in Computer Science
-
-
Nguyen, P.1
-
19
-
-
33846870481
-
Lattice Reduction in Cryptology: An Update
-
P. Nguyen and J. Stern, Lattice Reduction in Cryptology: An Update, ANTS 2000, pp 85-112.
-
ANTS 2000
, pp. 85-112
-
-
Nguyen, P.1
Stern, J.2
|