<--- Back to Details
First PageDocument Content
Key size / National Security Agency / Cryptanalysis / Elliptic curve cryptography / Communications security / Public-key cryptography / Py / Key / NTRU / Cryptography / Key management / Stream ciphers
Date: 2014-08-28 01:07:14
Key size
National Security Agency
Cryptanalysis
Elliptic curve cryptography
Communications security
Public-key cryptography
Py
Key
NTRU
Cryptography
Key management
Stream ciphers

Microsoft PowerPoint - preneel_chinacrypt_aug14_v1.pptx

Add to Reading List

Source URL: homes.esat.kuleuven.be

Download Document from Source Website

File Size: 537,77 KB

Share Document on Facebook

Similar Documents

Algebra / Abstract algebra / Mathematics / Lie groups / Post-quantum cryptography / Algebraic structures / Lattice-based cryptography / Analytic geometry / Lattice / Field extension / Ring / Order

Characterizing overstretched NTRU attacks Gabrielle De Micheli, Nadia Heninger and Barak Shani University of Pennsylvania Abstract Overstretched NTRU, an NTRU variant with a large modulus, has been used as a building

DocID: 1xTAG - View Document

NTRU Prime: reducing attack surface at low cost Daniel J. Bernstein1 , Chitchanok Chuengsatiansup2 , Tanja Lange3 , and Christine van Vredendaal3 1

DocID: 1viGI - View Document

NTRU Prime Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, and Christine van Vredendaal Technische Universiteit Eindhoven 25 August 2016

DocID: 1vfuq - View Document

A Scalable Implementation of Fully Homomorphic Encryption Built on NTRU∗ Kurt Rohloff David Bruce Cousins Raytheon BBN Technologies 10 Moulton St.

DocID: 1u1LL - View Document

A subfield lattice attack on overstretched NTRU assumptions Cryptanalysis of some FHE and Graded Encoding Schemes Martin Albrecht1? , Shi Bai2?? , and L´eo Ducas3? ? ? 1

DocID: 1t0yC - View Document