<--- Back to Details
First PageDocument Content
Abstract algebra / Cyberwarfare / Lattice points / NTRUEncrypt / NTRUSign / Lattice / NTRU / Lenstra–Lenstra–Lovász lattice basis reduction algorithm / Polynomial / Post-quantum cryptography / Mathematics / Cryptography
Date: 2011-04-23 07:41:21
Abstract algebra
Cyberwarfare
Lattice points
NTRUEncrypt
NTRUSign
Lattice
NTRU
Lenstra–Lenstra–Lovász lattice basis reduction algorithm
Polynomial
Post-quantum cryptography
Mathematics
Cryptography

Add to Reading List

Source URL: www.szydlo.com

Download Document from Source Website

File Size: 277,37 KB

Share Document on Facebook

Similar Documents

Algebra / Abstract algebra / Mathematics / Lie groups / Post-quantum cryptography / Algebraic structures / Lattice-based cryptography / Analytic geometry / Lattice / Field extension / Ring / Order

Characterizing overstretched NTRU attacks Gabrielle De Micheli, Nadia Heninger and Barak Shani University of Pennsylvania Abstract Overstretched NTRU, an NTRU variant with a large modulus, has been used as a building

DocID: 1xTAG - View Document

NTRU Prime: reducing attack surface at low cost Daniel J. Bernstein1 , Chitchanok Chuengsatiansup2 , Tanja Lange3 , and Christine van Vredendaal3 1

DocID: 1viGI - View Document

NTRU Prime Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, and Christine van Vredendaal Technische Universiteit Eindhoven 25 August 2016

DocID: 1vfuq - View Document

A Scalable Implementation of Fully Homomorphic Encryption Built on NTRU∗ Kurt Rohloff David Bruce Cousins Raytheon BBN Technologies 10 Moulton St.

DocID: 1u1LL - View Document

A subfield lattice attack on overstretched NTRU assumptions Cryptanalysis of some FHE and Graded Encoding Schemes Martin Albrecht1? , Shi Bai2?? , and L´eo Ducas3? ? ? 1

DocID: 1t0yC - View Document