-
1
-
-
51249173801
-
-
Babai, L.: On Lovasz lattice reduction and the nearest lattice point problem. Combinatorica 6(1), 1-13 (1986)
-
Babai, L.: On Lovasz" lattice reduction and the nearest lattice point problem. Combinatorica 6(1), 1-13 (1986)
-
-
-
-
2
-
-
77956089601
-
Factorization of a 512-bit RSA modulus
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Cavallar, S., Dodson, B., Lenstra, A.K., Lioen, W., Montgomery, P.L., Murphy, B., te Riele, H.J.J., et al.: Factorization of a 512-bit RSA modulus. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 1-17. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 1-17
-
-
Cavallar, S.1
Dodson, B.2
Lenstra, A.K.3
Lioen, W.4
Montgomery, P.L.5
Murphy, B.6
te Riele, H.J.J.7
-
3
-
-
84957355408
-
Lattice Attack on NTRU
-
Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
-
Coppersmith, D., Shamir, A.: Lattice Attack on NTRU. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 52-61. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 52-61
-
-
Coppersmith, D.1
Shamir, A.2
-
4
-
-
44449128937
-
Predicting lattice reduction
-
Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
-
Gama, N., Nguyen, P.Q.: Predicting lattice reduction. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 31-51. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 31-51
-
-
Gama, N.1
Nguyen, P.Q.2
-
5
-
-
84945126587
-
Key recovery and message attacks on NTRU-composite
-
Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
-
Gentry, C.: Key recovery and message attacks on NTRU-composite. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, p. 182. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 182
-
-
Gentry, C.1
-
6
-
-
84947808606
-
-
Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: A new high speed public key cryptosystem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, 1423, pp. 267-288. Springer, Heidelberg (1998)
-
Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: A new high speed public key cryptosystem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 267-288. Springer, Heidelberg (1998)
-
-
-
-
7
-
-
68849115316
-
-
Hoffstein, J., Silverman, J.H.: Invertibility in truncated polynomial rings. Technical report, NTRU Cryptosystems, Report #009, version 1 (October 1998), http://www.ntru.com
-
Hoffstein, J., Silverman, J.H.: Invertibility in truncated polynomial rings. Technical report, NTRU Cryptosystems, Report #009, version 1 (October 1998), http://www.ntru.com
-
-
-
-
8
-
-
0041967528
-
Random small hamming weight products with applications to cryptography
-
Hoffstein, J., Silverman, J.H.: Random small hamming weight products with applications to cryptography. Discrete Applied Mathematics 130(1), 37-49 (2003)
-
(2003)
Discrete Applied Mathematics
, vol.130
, Issue.1
, pp. 37-49
-
-
Hoffstein, J.1
Silverman, J.H.2
-
9
-
-
35248868901
-
The Impact of Decryption Failures on the Security of NTRU Encryption
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Howgrave-Graham, N., Nguyen, P., Pointcheval, D., Proos, J., Silverman, J.H., Singer, A., Whyte, W.: The Impact of Decryption Failures on the Security of NTRU Encryption. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 226-246. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 226-246
-
-
Howgrave-Graham, N.1
Nguyen, P.2
Pointcheval, D.3
Proos, J.4
Silverman, J.H.5
Singer, A.6
Whyte, W.7
-
10
-
-
33646827775
-
NAEP: Provable Security in the Presence of Decryption Failures IACR ePrint Archive
-
Report 2003-172
-
Howgrave-Graham, N., Silverman, J.H., Singer, A., Whyte, W.: NAEP: Provable Security in the Presence of Decryption Failures IACR ePrint Archive, Report 2003-172, http://eprint.iacr.org/2003/172/
-
-
-
Howgrave-Graham, N.1
Silverman, J.H.2
Singer, A.3
Whyte, W.4
-
11
-
-
24144458510
-
-
CT-RSA, pp
-
Howgrave-Graham, N., Silverman, J.H., Whyte, W.: Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 CT-RSA, pp. 118-135 (2005)
-
(2005)
Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3
, pp. 118-135
-
-
Howgrave-Graham, N.1
Silverman, J.H.2
Whyte, W.3
-
12
-
-
38049125101
-
A hybrid meet-in-the-middle and lattice reduction attack on NTRU
-
Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
-
Howgrave-Graham, N.: A hybrid meet-in-the-middle and lattice reduction attack on NTRU. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 150-169. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 150-169
-
-
Howgrave-Graham, N.1
-
14
-
-
0000653210
-
Selecting Cryptographic Key Sizes
-
Lenstra, A., Verheul, E.: Selecting Cryptographic Key Sizes. Journal of Cryptology 14(4), 255-293 (2001)
-
(2001)
Journal of Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.1
Verheul, E.2
-
15
-
-
84958950822
-
-
Micciancio, D.: Improving Lattice Based Cryptosystems Using the Hermite Normal Form. In: Silverman, J.H. (ed.) CaLC 2001. LNCS, 2146, pp. 126-145. Springer, Heidelberg (2001)
-
Micciancio, D.: Improving Lattice Based Cryptosystems Using the Hermite Normal Form. In: Silverman, J.H. (ed.) CaLC 2001. LNCS, vol. 2146, pp. 126-145. Springer, Heidelberg (2001)
-
-
-
-
16
-
-
40249100243
-
-
Mol, P., Yung, M.: Recovering NTRU Secret Key from Inversion Oracles. In: Cramer, R. (ed.) PKC 2008. LNCS, 4939, pp. 18-36. Springer, Heidelberg (2008)
-
Mol, P., Yung, M.: Recovering NTRU Secret Key from Inversion Oracles. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 18-36. Springer, Heidelberg (2008)
-
-
-
-
17
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120-126 (1978)
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.M.3
-
18
-
-
84869713415
-
-
RSA Laboratories
-
RSA Laboratories, RSAES-OAEP Encryption Scheme, ftp://ftp.rsasecurity. com/pub/rsalabs/rsa/-algorithm/rsa-oaep-spec.pdf
-
RSAES-OAEP Encryption Scheme
-
-
-
19
-
-
35248874386
-
Lattice Reduction by Random Sampling and Birthday Methods
-
Alt, H, Habib, M, eds, STACS 2003, Springer, Heidelberg
-
Schnorr, C.P.: Lattice Reduction by Random Sampling and Birthday Methods. In: Alt, H., Habib, M. (eds.) STACS 2003. LNCS, vol. 2607, pp. 145-156. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2607
, pp. 145-156
-
-
Schnorr, C.P.1
-
20
-
-
84955603054
-
Hidden Collisions on DSS
-
Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
-
Vaudenay, S.: Hidden Collisions on DSS. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 83-88. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 83-88
-
-
Vaudenay, S.1
|