메뉴 건너뛰기




Volumn 2442, Issue , 2002, Pages 210-225

Analysis and improvements of NTRU encryption paddings

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 84937406876     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45708-9_14     Document Type: Conference Paper
Times cited : (35)

References (28)
  • 1
    • 84957629783 scopus 로고    scopus 로고
    • Relations among Notions of Security for Public-Key Encryption Schemes
    • Springer-Verlag
    • M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among Notions of Security for Public-Key Encryption Schemes. In Proc. Of Crypto ’98, LNCS 1462, pages 26–45. Springer-Verlag, 1998
    • (1998) Proc. Of Crypto ’98, LNCS , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 2
    • 84948986458 scopus 로고
    • Optimal Asymmetric Encryption
    • Springer-Verlag
    • M. Bellare and P. Rogaway. Optimal Asymmetric Encryption. In Proc. Of Eurocrypt ’94, LNCS 950, pages 92–111. Springer-Verlag, 1995
    • (1995) Proc. Of Eurocrypt ’94, LNCS , vol.950 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 84937483916 scopus 로고    scopus 로고
    • NTRU CryptosystemsTechnical reports
    • NTRU Cryptosystems. Technical reports available at http://www.ntru.com. 2002
    • (2002)
  • 7
    • 84955339164 scopus 로고    scopus 로고
    • Secure Integration of Asymmetric and Symmetric Encryption Schemes
    • Springer- Verlag
    • E. Fujisaki and T. Okamoto. Secure Integration of Asymmetric and Symmetric Encryption Schemes. In Proc. Of Crypto ’99, LNCS 1666, pages 537–554. Springer- Verlag, 1999
    • (1999) Proc. Of Crypto ’99, LNCS , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 8
    • 0033908504 scopus 로고    scopus 로고
    • How to Enhance the Security of Public-Key Encryption at Minimum Cost
    • Special issue on cryptography and information security
    • E. Fujisaki and T. Okamoto. How to Enhance the Security of Public-Key Encryption at Minimum Cost. IEICE Trans. Fundamentals of Electronics, Comunications and Computer Sciences, E83-A(1), 2000. Special issue on cryptography and information security.
    • (2000) IEICE Trans. Fundamentals of Electronics, Comunications and Computer Sciences , vol.E83-A , Issue.1
    • Fujisaki, E.1    Okamoto, T.2
  • 10
    • 84945126587 scopus 로고    scopus 로고
    • Key Recovery and Message Attacks on NTRU-Composite
    • C. Gentry. Key Recovery and Message Attacks on NTRU-Composite. In Proc. Of Eurocrypt ’01, LNCS 2045, pages 182–194. Springer-Verlag, 2001
    • (2001) Proc. Of Eurocrypt ’01, LNCS , vol.2045 , pp. 182-194
    • Gentry, C.1
  • 12
    • 84958629363 scopus 로고    scopus 로고
    • Reaction Attacks against Several Public-Key Cryptosystems
    • C. Hall, I. Goldberg, and B. Schneier. Reaction Attacks against Several Public-Key Cryptosystems. In Proc. Of ICICS ’99, LNCS, pages 2–12. Springer-Verlag, 1999
    • (1999) Proc. Of ICICS ’99, LNCS , pp. 2-12
    • Hall, C.1    Goldberg, I.2    Schneier, B.3
  • 13
    • 84947808606 scopus 로고    scopus 로고
    • NTRU: A Ring based Public Key Cryptosystem
    • Springer-Verlag First presented at the rump session of Crypto ’96
    • J. Hoffstein, J. Pipher, and J.H. Silverman. NTRU: a Ring based Public Key Cryptosystem. In Proc. Of ANTS III, LNCS 1423, pages 267–288 Springer-Verlag, 1998. First presented at the rump session of Crypto ’96
    • (1998) Proc. Of ANTS III, LNCS , pp. 267-288
    • Hoffstein, J.1    Pipher, J.2    Silverman, J.H.3
  • 20
    • 34250244723 scopus 로고
    • Factoring Polynomials with Rational Coefficients
    • A. K. Lenstra, H. W. Lenstra, and L. Lovàsz. Factoring Polynomials with Rational Coefficients. Mathematische Ann., 261:513–534, 1982
    • (1982) Mathematische Ann , vol.261 , pp. 513-534
    • Lenstra, A.K.1    Lenstra, H.W.2    Lovàsz, L.3
  • 21
    • 84958959970 scopus 로고    scopus 로고
    • Dimension Reduction Methods for Convolution Modular Lattices
    • Springer-Verlag
    • A. May and J. H. Silverman. Dimension Reduction Methods for Convolution Modular Lattices. In Proc. Of CALC ’01, LNCS 2146. Springer-Verlag, 2001
    • (2001) Proc. Of CALC ’01, LNCS , vol.2146
    • May, A.1    Silverman, J.H.2
  • 22
    • 84958950822 scopus 로고    scopus 로고
    • Improving Lattice-based Cryptosystems using the Hermite Normal Form
    • Springer-Verlag
    • D. Micciancio. Improving Lattice-based Cryptosystems using the Hermite Normal Form. In Proc. Of CALC ’01, LNCS 2146. Springer-Verlag, 2001
    • (2001) Proc. Of CALC ’01, LNCS , vol.2146
    • Micciancio, D.1
  • 23
    • 0024983231 scopus 로고
    • Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attacks
    • M. Naor and M. Yung. Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attacks. In Proc. Of the 22nd STOC, pages 427–437. ACM Press, 1990
    • (1990) Proc. Of the 22Nd STOC , pp. 427-437
    • Naor, M.1    Yung, M.2
  • 24
    • 33846867921 scopus 로고    scopus 로고
    • The Two Faces of Lattices in Cryptology
    • Springer-Verlag
    • P. Q. Nguyen and J. Stern. The Two Faces of Lattices in Cryptology. In Proc. Of CALC ’01, LNCS 2146. Springer-Verlag, 2001
    • (2001) Proc. Of CALC ’01, LNCS , vol.2146
    • Nguyen, P.Q.1    Stern, J.2
  • 25
    • 84937543435 scopus 로고    scopus 로고
    • REACT: Rapid Enhanced-security Asymmetric Cryptosystem Transform
    • Springer-Verlag
    • T. Okamoto and D. Pointcheval. REACT: Rapid Enhanced-security Asymmetric Cryptosystem Transform. In Proc. Of CT-RSA ’01, LNCS 2020, pages 159–175. Springer-Verlag, 2001
    • (2001) Proc. Of CT-RSA ’01, LNCS , vol.2020 , pp. 159-175
    • Okamoto, T.1    Pointcheval, D.2
  • 26
    • 84957795480 scopus 로고    scopus 로고
    • Chosen-Ciphertext Security for any One-Way Cryptosystem
    • Springer-Verlag
    • D. Pointcheval. Chosen-Ciphertext Security for any One-Way Cryptosystem. In Proc. Of PKC ’00, LNCS 1751, pages 129–146. Springer-Verlag, 2000
    • (2000) Proc. Of PKC ’00, LNCS , vol.1751 , pp. 129-146
    • Pointcheval, D.1
  • 27
    • 84974554584 scopus 로고
    • Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
    • Springer-Verlag
    • C. Rackoff and D. R. Simon. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In Proc. Of Crypto ’91, LNCS 576, pages 433–444. Springer-Verlag, 1992
    • (1992) Proc. Of Crypto ’91, LNCS , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.R.2
  • 28
    • 0023532388 scopus 로고
    • A Hierarchy of Polynomial Lattice Basis Reduction Algorithms
    • C. P. Schnorr. A Hierarchy of Polynomial Lattice Basis Reduction Algorithms. Theoretical Computer Science, 53:201–224, 1987.
    • (1987) Theoretical Computer Science , vol.53 , pp. 201-224
    • Schnorr, C.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.