<--- Back to Details
First PageDocument Content
Automorphic forms / Post-quantum cryptography / Analytic number theory / Modular forms / Number theorists / NTRUEncrypt / Joseph H. Silverman / NTRU / Jill Pipher / Mathematical analysis / Mathematics / Abstract algebra
Date: 2009-09-09 20:10:33
Automorphic forms
Post-quantum cryptography
Analytic number theory
Modular forms
Number theorists
NTRUEncrypt
Joseph H. Silverman
NTRU
Jill Pipher
Mathematical analysis
Mathematics
Abstract algebra

1. J. Hoffstein, A. Kontorovich, The first non-vanishing quadratic twist of an automorphic L-series, preprint 2. S. Ganguly, J. Hoffstein, J. Sengupta, Determining modular forms on SL(2, Z) by central values of convoluti

Add to Reading List

Source URL: www.math.brown.edu

Download Document from Source Website

File Size: 30,57 KB

Share Document on Facebook

Similar Documents

Lattice-based cryptography / Post-quantum cryptography / NTRU / NTRUEncrypt

Submitted exclusively to the London Mathematical Society doi:Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key Christine van Vredendaal

DocID: 1pn68 - View Document

Automorphic forms / Post-quantum cryptography / Analytic number theory / Modular forms / Number theorists / NTRUEncrypt / Joseph H. Silverman / NTRU / Jill Pipher / Mathematical analysis / Mathematics / Abstract algebra

1. J. Hoffstein, A. Kontorovich, The first non-vanishing quadratic twist of an automorphic L-series, preprint 2. S. Ganguly, J. Hoffstein, J. Sengupta, Determining modular forms on SL(2, Z) by central values of convoluti

DocID: 1a7I2 - View Document

Partial differential equations / Post-quantum cryptography / Number theorists / Jill Pipher / Fourier analysis / Differential operators / NTRUEncrypt / NTRU / Dirichlet problem / Mathematical analysis / Mathematics / Calculus

Curriculum Vitae: Jill C. Pipher ACADEMIC DEGREES B.A. in Mathematics, UCLA, 1979 PhD. in Mathematics, UCLA, 1985, Harmonic Analysis

DocID: 19Pac - View Document

Polynomial / ElGamal encryption / NTRUEncrypt / Ideal lattice cryptography / Cryptography / Lattice problem / One-way function

Proposal of a new efficient public key system for encryption and digital signatures Gerold Gr¨ unauer Email:

DocID: 12GG8 - View Document

Chosen-ciphertext attack / Ciphertext / Polynomial ring / NTRUEncrypt / Cryptography / Abstract algebra / Public-key cryptography

Noncommutative Polly Cracker-type cryptosystems and chosen-ciphertext security Tapan Rai ∗ and Stanislav Bulygin †

DocID: 12FTJ - View Document