NTRU

Results: 123



#Item
1Algebra / Abstract algebra / Mathematics / Lie groups / Post-quantum cryptography / Algebraic structures / Lattice-based cryptography / Analytic geometry / Lattice / Field extension / Ring / Order

Characterizing overstretched NTRU attacks Gabrielle De Micheli, Nadia Heninger and Barak Shani University of Pennsylvania Abstract Overstretched NTRU, an NTRU variant with a large modulus, has been used as a building

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-06-25 14:23:34
2

NTRU Prime: reducing attack surface at low cost Daniel J. Bernstein1 , Chitchanok Chuengsatiansup2 , Tanja Lange3 , and Christine van Vredendaal3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-08-17 12:09:19
    3

    NTRU Prime Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, and Christine van Vredendaal Technische Universiteit Eindhoven 25 August 2016

    Add to Reading List

    Source URL: hyperelliptic.org

    Language: English - Date: 2016-08-28 15:42:38
      4

      A Scalable Implementation of Fully Homomorphic Encryption Built on NTRU∗ Kurt Rohloff David Bruce Cousins Raytheon BBN Technologies 10 Moulton St.

      Add to Reading List

      Source URL: www.chi.uni-hannover.de

      Language: English - Date: 2014-03-07 11:05:16
        5

        A subfield lattice attack on overstretched NTRU assumptions Cryptanalysis of some FHE and Graded Encoding Schemes Martin Albrecht1? , Shi Bai2?? , and L´eo Ducas3? ? ? 1

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2016-07-04 10:02:28
          6

          NTRU: A PUBLIC KEY CRYPTOSYSTEM NTRU Cryptosystems, Inc. (www.ntru.com) Jeff Hoffstein Daniel Lieman Jill Pipher Joseph H. Silverman

          Add to Reading List

          Source URL: grouper.ieee.org

          - Date: 2008-04-27 09:53:40
            7

            Improved Analysis of Kannan’s Shortest Lattice Vector Algorithm Abstract. The security of lattice-based cryptosystems such as NTRU, GGH and Ajtai-Dwork essentially relies upon the intractability of computing a shortest

            Add to Reading List

            Source URL: perso.ens-lyon.fr

            - Date: 2009-10-16 07:35:09
              8Cryptography / Post-quantum cryptography / Lattice-based cryptography / Public-key cryptography / Key management / Homomorphic encryption / NTRU / Lattice problem / SWIFFT / Cryptographic hash function / Key / Lattice

              Lattice Cryptography: A White Paper Daniele Micciancio∗ March 16, 2010 1

              Add to Reading List

              Source URL: thmatters.files.wordpress.com

              Language: English - Date: 2015-09-29 10:45:40
              9Lattice-based cryptography / Post-quantum cryptography / NTRU / NTRUEncrypt

              Submitted exclusively to the London Mathematical Society doi:Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key Christine van Vredendaal

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2016-02-22 01:46:08
              10Cryptography / Post-quantum cryptography / Quantum cryptography / Public-key cryptography / Lattice-based cryptography / NTRU / Quantum key distribution / Quantum computing / Elliptic curve cryptography / Key size / BLISS signature scheme / Cryptanalysis

              Towards Quantum Resistant Cryptography Standards Dr. Markku-Juhani O. Saarinen Research Fellow, Queen’s University Belfast

              Add to Reading List

              Source URL: ctcrypt.ru

              Language: English - Date: 2016-06-10 06:35:53
              UPDATE