NTRU

Results: 123



#Item
31

An Algebraic Approach to NTRU (q = 2n ) via Witt Vectors and Overdetermined Systems of Nonlinear Equations J.H. Silverman1 , N.P. Smart2 , and F. Vercauteren2 1

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2011-08-26 10:46:19
    32

    XXXX, 1–33 © De Gruyter YYYY NTRU Cryptosystem: Recent Developments and Emerging Mathematical Problems in Finite

    Add to Reading List

    Source URL: users.monash.edu.au

    Language: English - Date: 2014-05-13 01:20:10
      33

      Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001 Craig Gentry1 , Jakob Jonsson2 , Jacques Stern3? , and Michael Szydlo2 1 2

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2006-12-12 19:25:24
        34

        Key recovery attacks on NTRU without ciphertext validation routine Daewan Han, Jin Hong, Jae Woo Han, and Daesung Kwon National Security Research Institute, 161 Gajeong-dong, Yuseong-gu, Daejeon, , KOREA dwh,jinho

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2003-04-18 23:20:42
          35Automorphic forms / Post-quantum cryptography / Analytic number theory / Modular forms / Number theorists / NTRUEncrypt / Joseph H. Silverman / NTRU / Jill Pipher / Mathematical analysis / Mathematics / Abstract algebra

          1. J. Hoffstein, A. Kontorovich, The first non-vanishing quadratic twist of an automorphic L-series, preprint 2. S. Ganguly, J. Hoffstein, J. Sengupta, Determining modular forms on SL(2, Z) by central values of convoluti

          Add to Reading List

          Source URL: www.math.brown.edu

          Language: English - Date: 2009-09-09 20:10:33
          36Partial differential equations / Post-quantum cryptography / Number theorists / Jill Pipher / Fourier analysis / Differential operators / NTRUEncrypt / NTRU / Dirichlet problem / Mathematical analysis / Mathematics / Calculus

          Curriculum Vitae: Jill C. Pipher ACADEMIC DEGREES B.A. in Mathematics, UCLA, 1979 PhD. in Mathematics, UCLA, 1985, Harmonic Analysis

          Add to Reading List

          Source URL: www.math.brown.edu

          Language: English - Date: 2015-01-15 13:34:56
          37NTRUSign / Lattice-based cryptography / NTRU / Homomorphic encryption / Digital signature / Lattice problem / RSA / Elliptic curve cryptography / Lattice / Cryptography / Post-quantum cryptography / Public-key cryptography

          Practical Lattice-based Digital Signature Schemes

          Add to Reading List

          Source URL: csrc.nist.gov

          Language: English - Date: 2015-04-09 11:42:22
          38Key management / Elliptic curve Diffie–Hellman / Elliptic curve cryptography / NTRU / Kirkwood / Key / Cipher / Cryptography / Post-quantum cryptography / Public-key cryptography

          Failure is not an Option: Standardization Issues for Post-Quantum Key Agreement

          Add to Reading List

          Source URL: csrc.nist.gov

          Language: English - Date: 2015-04-03 09:38:35
          39Secure communication / Electronic commerce / Learning with errors / NTRU / Transport Layer Security / Cipher suite / Elliptic curve cryptography / Quantum computer / RSA / Cryptography / Cryptographic protocols / Internet protocols

          Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos1 , Craig Costello2 , Michael Naehrig2 , and Douglas Stebila3,∗ 1 2 3

          Add to Reading List

          Source URL: csrc.nist.gov

          Language: English - Date: 2015-04-09 11:27:47
          40Quantum cryptography / Theoretical computer science / Key management / Quantum computer / Key size / Quantum algorithm / NTRU / Public-key cryptography / Cryptanalysis / Cryptography / Applied mathematics / Quantum information science

          Quantum Computing and Cryptography

          Add to Reading List

          Source URL: www.entrust.com

          Language: English - Date: 2013-05-03 16:46:34
          UPDATE