NTRUEncrypt

Results: 21



#Item
1Submitted exclusively to the London Mathematical Society doi:Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key Christine van Vredendaal

Submitted exclusively to the London Mathematical Society doi:Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key Christine van Vredendaal

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-02-22 01:46:08
21. J. Hoffstein, A. Kontorovich, The first non-vanishing quadratic twist of an automorphic L-series, preprint 2. S. Ganguly, J. Hoffstein, J. Sengupta, Determining modular forms on SL(2, Z) by central values of convoluti

1. J. Hoffstein, A. Kontorovich, The first non-vanishing quadratic twist of an automorphic L-series, preprint 2. S. Ganguly, J. Hoffstein, J. Sengupta, Determining modular forms on SL(2, Z) by central values of convoluti

Add to Reading List

Source URL: www.math.brown.edu

Language: English - Date: 2009-09-09 20:10:33
3Curriculum Vitae: Jill C. Pipher  ACADEMIC DEGREES B.A. in Mathematics, UCLA, 1979 PhD. in Mathematics, UCLA, 1985, Harmonic Analysis

Curriculum Vitae: Jill C. Pipher ACADEMIC DEGREES B.A. in Mathematics, UCLA, 1979 PhD. in Mathematics, UCLA, 1985, Harmonic Analysis

Add to Reading List

Source URL: www.math.brown.edu

Language: English - Date: 2015-01-15 13:34:56
4Proposal of a new efficient public key system for encryption and digital signatures Gerold Gr¨ unauer Email:

Proposal of a new efficient public key system for encryption and digital signatures Gerold Gr¨ unauer Email:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-11-27 12:23:14
5Noncommutative Polly Cracker-type cryptosystems and chosen-ciphertext security Tapan Rai ∗ and Stanislav Bulygin †

Noncommutative Polly Cracker-type cryptosystems and chosen-ciphertext security Tapan Rai ∗ and Stanislav Bulygin †

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-04 05:51:00
6CS255: Cryptography and Computer Security  Winter 2000 Final Exam Instructions

CS255: Cryptography and Computer Security Winter 2000 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-03-05 14:35:42
7NTRUSign Introduced  December 2001 Jeff Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joe Silverman, William Whyte

NTRUSign Introduced December 2001 Jeff Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joe Silverman, William Whyte

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
8Intro to public-key ciphers A symmetric or private-key cipher is one in which knowledge of the encryption key is explicitly or implicitly equivalent to knowing the decryption key. A asymmetric or public-key cipher is one

Intro to public-key ciphers A symmetric or private-key cipher is one in which knowledge of the encryption key is explicitly or implicitly equivalent to knowing the decryption key. A asymmetric or public-key cipher is one

Add to Reading List

Source URL: www.math.umn.edu

Language: English - Date: 2009-12-02 14:27:26
9Cryptanalysis of NTRU with two public keys Abderrahmane Nitaj Laboratoire de Math´ematiques Nicolas Oresme Universit´e de Caen, France Email: [removed]

Cryptanalysis of NTRU with two public keys Abderrahmane Nitaj Laboratoire de Math´ematiques Nicolas Oresme Universit´e de Caen, France Email: [removed]

Add to Reading List

Source URL: www.math.unicaen.fr

Language: English - Date: 2011-09-02 16:54:04
10NTRU暗号に関する ゼロ知識証明 [removed]SCIS 2009 3F2-4]  草川恵太/田中圭介(東京工業大学)

NTRU暗号に関する ゼロ知識証明 [removed]SCIS 2009 3F2-4] 草川恵太/田中圭介(東京工業大学)

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2010-01-23 11:51:06