-
1
-
-
38049053937
-
-
Consortium for Efficient Embedded Security. Efficient embedded security standards #1: Implementation aspects of NTRU and NSS, 2001.
-
Consortium for Efficient Embedded Security. Efficient embedded security standards #1: Implementation aspects of NTRU and NSS, 2001.
-
-
-
-
2
-
-
38049082433
-
-
Consortium for Efficient Embedded Security. Efficient embedded security standards #1: Implementation aspects of NTRUEncrypt and NTRUSign, 2002.
-
Consortium for Efficient Embedded Security. Efficient embedded security standards #1: Implementation aspects of NTRUEncrypt and NTRUSign, 2002.
-
-
-
-
3
-
-
38049034724
-
Key recovery and message attacks on NTRU-composite
-
IACR, Springer-Verlag
-
C. Gentry. Key recovery and message attacks on NTRU-composite. In Proc. of Eurocrypt '01, volume 2045 of LNCS. IACR, Springer-Verlag, 2001.
-
(2001)
Proc. of Eurocrypt '01, volume 2045 of LNCS
-
-
Gentry, C.1
-
4
-
-
35248821952
-
Cryptanalysis of the NTRU signature scheme (NSS) from Eurocrypt 2001
-
Proc. of Asiacrypt '01, of, Springer-Verlag
-
C. Gentry, J. Jonsson, J. Stern, and M. Szydlo. Cryptanalysis of the NTRU signature scheme (NSS) from Eurocrypt 2001. In Proc. of Asiacrypt '01, volume 2248 of LNCS. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2248
-
-
Gentry, C.1
Jonsson, J.2
Stern, J.3
Szydlo, M.4
-
5
-
-
84947222499
-
Cryptanalysis of the revised NTRU signature scheme
-
Proc. of Eurocrypt '02, of, Springer-Verlag
-
C. Gentry and M. Szydlo. Cryptanalysis of the revised NTRU signature scheme. In Proc. of Eurocrypt '02, volume 2332 of LNCS. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2332
-
-
Gentry, C.1
Szydlo, M.2
-
6
-
-
33646854822
-
Key recovery attacks on NTRU without ciphertext validation routine. ACISP 2003
-
D. Han, J. Hong, J. W. Han, and D. Kwon. Key recovery attacks on NTRU without ciphertext validation routine. ACISP 2003, LNCS 2727:pages 274-284, 2003.
-
(2003)
LNCS
, vol.2727
, pp. 274-284
-
-
Han, D.1
Hong, J.2
Han, J.W.3
Kwon, D.4
-
7
-
-
33646262791
-
NTRUSIGN: Digital signatures using the NTRU lattice
-
Proc. of CT-RSA, of, Springer-Verlag
-
J. Hoffstein, N. A. Howgrave-Graham, J. Pipher, J. H. Silverman, and W. Whyte. NTRUSIGN: Digital signatures using the NTRU lattice. In Proc. of CT-RSA, volume 2612 of LNCS. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2612
-
-
Hoffstein, J.1
Howgrave-Graham, N.A.2
Pipher, J.3
Silverman, J.H.4
Whyte, W.5
-
8
-
-
84947808606
-
-
J. Hoffstein, J. Pipher, and J. Silverman. NTRU: a ring based public key cryptosystem. In Proc. of ANTS III, 1423 of LNCS, pages 267-288. Springer-Verlag, 1998. First presented at the rump session of Crypto '96.
-
J. Hoffstein, J. Pipher, and J. Silverman. NTRU: a ring based public key cryptosystem. In Proc. of ANTS III, volume 1423 of LNCS, pages 267-288. Springer-Verlag, 1998. First presented at the rump session of Crypto '96.
-
-
-
-
11
-
-
35248868901
-
-
N. A. Howgrave-Graham, P. Q. Nguyen, D. Pointcheval, J. Proos., J. H. Silverman, A. Singer, and W. Whyte. The impact of decryption failures on the security of NTRU encryption. In Proc. of the 23rd Cryptology Conference (Crypto '03), 2729 of LNCS, pages 226-246. IACR, Springer-Verlag, 2003.
-
N. A. Howgrave-Graham, P. Q. Nguyen, D. Pointcheval, J. Proos., J. H. Silverman, A. Singer, and W. Whyte. The impact of decryption failures on the security of NTRU encryption. In Proc. of the 23rd Cryptology Conference (Crypto '03), volume 2729 of LNCS, pages 226-246. IACR, Springer-Verlag, 2003.
-
-
-
-
14
-
-
33746038898
-
Learning a parallelepiped: Cryptanalysis of GGH and NTRU signatures
-
S. Vaudenay, editor, Proc. of Eurocrypt '06, of, Springer
-
P. Q. Nguyen and O. Regev. Learning a parallelepiped: cryptanalysis of GGH and NTRU signatures. In S. Vaudenay, editor, Proc. of Eurocrypt '06, volume 4004 of LNCS, pages 271-288. Springer, 2006.
-
(2006)
LNCS
, vol.4004
, pp. 271-288
-
-
Nguyen, P.Q.1
Regev, O.2
-
15
-
-
38049015186
-
-
V. Shoup. Number Theory C, Library (NTL) version 5.4. Available at
-
V. Shoup. Number Theory C++ Library (NTL) version 5.4. Available at http://wvw.shoup.net/ntl/.
-
-
-
-
16
-
-
38049047452
-
J. H. Silverman. Invertibility in truncated polynomial rings. Technical report, NTRU Cryptosystems
-
available at
-
J. H. Silverman. Invertibility in truncated polynomial rings. Technical report, NTRU Cryptosystems, 2003. Technical reports available at http://www.ntru.com.
-
(2003)
Technical reports
-
-
-
17
-
-
38049066183
-
Technical report n. 18, version 1: Estimating decryption failure probabilities for ntruencrypt
-
Technical report, NTRU Cryptosystems, 2005
-
J. H. Silverman and W. Whyte. Technical report n. 18, version 1: Estimating decryption failure probabilities for ntruencrypt. Technical report, NTRU Cryptosystems, 2005.
-
-
-
Silverman, J.H.1
Whyte, W.2
|