NTRUEncrypt

Results: 21



#Item
1Lattice-based cryptography / Post-quantum cryptography / NTRU / NTRUEncrypt

Submitted exclusively to the London Mathematical Society doi:Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key Christine van Vredendaal

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-02-22 01:46:08
2Automorphic forms / Post-quantum cryptography / Analytic number theory / Modular forms / Number theorists / NTRUEncrypt / Joseph H. Silverman / NTRU / Jill Pipher / Mathematical analysis / Mathematics / Abstract algebra

1. J. Hoffstein, A. Kontorovich, The first non-vanishing quadratic twist of an automorphic L-series, preprint 2. S. Ganguly, J. Hoffstein, J. Sengupta, Determining modular forms on SL(2, Z) by central values of convoluti

Add to Reading List

Source URL: www.math.brown.edu

Language: English - Date: 2009-09-09 20:10:33
3Partial differential equations / Post-quantum cryptography / Number theorists / Jill Pipher / Fourier analysis / Differential operators / NTRUEncrypt / NTRU / Dirichlet problem / Mathematical analysis / Mathematics / Calculus

Curriculum Vitae: Jill C. Pipher ACADEMIC DEGREES B.A. in Mathematics, UCLA, 1979 PhD. in Mathematics, UCLA, 1985, Harmonic Analysis

Add to Reading List

Source URL: www.math.brown.edu

Language: English - Date: 2015-01-15 13:34:56
4Polynomial / ElGamal encryption / NTRUEncrypt / Ideal lattice cryptography / Cryptography / Lattice problem / One-way function

Proposal of a new efficient public key system for encryption and digital signatures Gerold Gr¨ unauer Email:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-11-27 12:23:14
5Chosen-ciphertext attack / Ciphertext / Polynomial ring / NTRUEncrypt / Cryptography / Abstract algebra / Public-key cryptography

Noncommutative Polly Cracker-type cryptosystems and chosen-ciphertext security Tapan Rai ∗ and Stanislav Bulygin †

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-04 05:51:00
6RSA / Finite fields / Cryptographic protocols / NTRUEncrypt / XTR / Cryptography / Public-key cryptography / Commitment scheme

CS255: Cryptography and Computer Security Winter 2000 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-03-05 14:35:42
7Lattice / Mathematics / Applied mathematics / Security / NTRUEncrypt / Post-quantum cryptography / NTRUSign / NTRU

NTRUSign Introduced December 2001 Jeff Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joe Silverman, William Whyte

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
8Cryptographic protocols / RSA / Diffie–Hellman key exchange / ElGamal encryption / Cipher / NTRUEncrypt / XTR / Cryptography / Public-key cryptography / Electronic commerce

Intro to public-key ciphers A symmetric or private-key cipher is one in which knowledge of the encryption key is explicitly or implicitly equivalent to knowing the decryption key. A asymmetric or public-key cipher is one

Add to Reading List

Source URL: www.math.umn.edu

Language: English - Date: 2009-12-02 14:27:26
9NTRU / Lattice / Lenstra–Lenstra–Lovász lattice basis reduction algorithm / RSA / Polynomial / Cryptography / Post-quantum cryptography / NTRUEncrypt

Cryptanalysis of NTRU with two public keys Abderrahmane Nitaj Laboratoire de Math´ematiques Nicolas Oresme Universit´e de Caen, France Email: [removed]

Add to Reading List

Source URL: www.math.unicaen.fr

Language: English - Date: 2011-09-02 16:54:04
10Number theory / Homotopy theory / NTRUEncrypt / Post-quantum cryptography

NTRU暗号に関する ゼロ知識証明 [removed]SCIS 2009 3F2-4] 草川恵太/田中圭介(東京工業大学)

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2010-01-23 11:51:06
UPDATE