1![Characterizing overstretched NTRU attacks Gabrielle De Micheli, Nadia Heninger and Barak Shani University of Pennsylvania Abstract Overstretched NTRU, an NTRU variant with a large modulus, has been used as a building Characterizing overstretched NTRU attacks Gabrielle De Micheli, Nadia Heninger and Barak Shani University of Pennsylvania Abstract Overstretched NTRU, an NTRU variant with a large modulus, has been used as a building](https://www.pdfsearch.io/img/a9af7c73d3bc87326a2b4ca16b57cef3.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2018-06-25 14:23:34
|
---|
2![NTRU Prime: reducing attack surface at low cost Daniel J. Bernstein1 , Chitchanok Chuengsatiansup2 , Tanja Lange3 , and Christine van Vredendaal3 1 NTRU Prime: reducing attack surface at low cost Daniel J. Bernstein1 , Chitchanok Chuengsatiansup2 , Tanja Lange3 , and Christine van Vredendaal3 1](https://www.pdfsearch.io/img/e61440b5199b336c0076cb65b9d037b9.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2017-08-17 12:09:19
|
---|
3![NTRU Prime Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, and Christine van Vredendaal Technische Universiteit Eindhoven 25 August 2016 NTRU Prime Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, and Christine van Vredendaal Technische Universiteit Eindhoven 25 August 2016](https://www.pdfsearch.io/img/4ed14388a7cc01e9b3201c2fe96a0c24.jpg) | Add to Reading ListSource URL: hyperelliptic.orgLanguage: English - Date: 2016-08-28 15:42:38
|
---|
4![A Scalable Implementation of Fully Homomorphic Encryption Built on NTRU∗ Kurt Rohloff David Bruce Cousins Raytheon BBN Technologies 10 Moulton St. A Scalable Implementation of Fully Homomorphic Encryption Built on NTRU∗ Kurt Rohloff David Bruce Cousins Raytheon BBN Technologies 10 Moulton St.](https://www.pdfsearch.io/img/ac7428e8de3fae099e801261422846be.jpg) | Add to Reading ListSource URL: www.chi.uni-hannover.deLanguage: English - Date: 2014-03-07 11:05:16
|
---|
5![A subfield lattice attack on overstretched NTRU assumptions Cryptanalysis of some FHE and Graded Encoding Schemes Martin Albrecht1? , Shi Bai2?? , and L´eo Ducas3? ? ? 1 A subfield lattice attack on overstretched NTRU assumptions Cryptanalysis of some FHE and Graded Encoding Schemes Martin Albrecht1? , Shi Bai2?? , and L´eo Ducas3? ? ? 1](https://www.pdfsearch.io/img/53780231ba01be84651086a79de04cd0.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2016-07-04 10:02:28
|
---|
6![NTRU: A PUBLIC KEY CRYPTOSYSTEM NTRU Cryptosystems, Inc. (www.ntru.com) Jeff Hoffstein Daniel Lieman Jill Pipher Joseph H. Silverman NTRU: A PUBLIC KEY CRYPTOSYSTEM NTRU Cryptosystems, Inc. (www.ntru.com) Jeff Hoffstein Daniel Lieman Jill Pipher Joseph H. Silverman](https://www.pdfsearch.io/img/5f9fad38f186f35ae69483d2d4c4d249.jpg) | Add to Reading ListSource URL: grouper.ieee.org- Date: 2008-04-27 09:53:40
|
---|
7![Improved Analysis of Kannan’s Shortest Lattice Vector Algorithm Abstract. The security of lattice-based cryptosystems such as NTRU, GGH and Ajtai-Dwork essentially relies upon the intractability of computing a shortest Improved Analysis of Kannan’s Shortest Lattice Vector Algorithm Abstract. The security of lattice-based cryptosystems such as NTRU, GGH and Ajtai-Dwork essentially relies upon the intractability of computing a shortest](https://www.pdfsearch.io/img/31518b06ef08fdb704b85cd67a1df141.jpg) | Add to Reading ListSource URL: perso.ens-lyon.fr- Date: 2009-10-16 07:35:09
|
---|
8![Lattice Cryptography: A White Paper Daniele Micciancio∗ March 16, 2010 1 Lattice Cryptography: A White Paper Daniele Micciancio∗ March 16, 2010 1](https://www.pdfsearch.io/img/a7163f2dd50ed420e34b64163e21c95a.jpg) | Add to Reading ListSource URL: thmatters.files.wordpress.comLanguage: English - Date: 2015-09-29 10:45:40
|
---|
9![Submitted exclusively to the London Mathematical Society doi:Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key Christine van Vredendaal Submitted exclusively to the London Mathematical Society doi:Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key Christine van Vredendaal](https://www.pdfsearch.io/img/d81a714839aabf46f28e9aa2285bfdba.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2016-02-22 01:46:08
|
---|
10![Towards Quantum Resistant Cryptography Standards Dr. Markku-Juhani O. Saarinen Research Fellow, Queen’s University Belfast Towards Quantum Resistant Cryptography Standards Dr. Markku-Juhani O. Saarinen Research Fellow, Queen’s University Belfast](https://www.pdfsearch.io/img/ef18397e586733a01f2d46752ccc1926.jpg) | Add to Reading ListSource URL: ctcrypt.ruLanguage: English - Date: 2016-06-10 06:35:53
|
---|