|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1 occurrences of 1 keywords
|
|
|
Results
Found 38 publication records. Showing 38 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
80 | Daewan Han, Myung-Hwan Kim, Yongjin Yeom |
Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Paeng-Jung-Ha cryptosystem, GGH, NTRUEncrypt, Lattice attack |
75 | Joseph H. Silverman, William Whyte |
Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
|
70 | Nicolas Gama, Phong Q. Nguyen |
New Chosen-Ciphertext Attacks on NTRU. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
70 | Nick Howgrave-Graham |
A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Philip S. Hirschhorn, Jeffrey Hoffstein, Nick Howgrave-Graham, William Whyte |
Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
52 | Mats Näslund, Igor E. Shparlinski, William Whyte |
On the Bit Security of NTRUEncrypt. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
47 | Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar |
Public Key Cryptography in Sensor Networks - Revisited. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Petros Mol, Moti Yung |
Recovering NTRU Secret Key from Inversion Oracles. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
NTRUEncrypt, Inversion Oracles, Universal Breaking, Public-Key Cryptanalysis |
28 | Lin You, Yan Wang, Liang Li, Gengran Hu |
Secure Two-party Computation Approach for NTRUEncrypt. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
28 | Taehyun Kim, Mun-Kyu Lee |
Efficient and Secure Implementation of NTRUEncrypt Using Signed Sliding Window Method. |
IEEE Access |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Farnoud Farahmand, Malik Umar Sharif, Kevin Briggs, Kris Gaj |
A High-Speed Constant-Time Hardware Implementation of NTRUEncrypt SVES. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
28 | Thomas Schamberger, Oliver Mischke, Johanna Sepúlveda |
Practical Evaluation of Masking for NTRUEncrypt on ARM Cortex-M4. |
COSADE |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Farnoud Farahmand, Duc Tri Nguyen, Viet Ba Dang, Ahmed Ferozpuri, Kris Gaj |
Software/Hardware Codesign of the Post Quantum Cryptography Algorithm NTRUEncrypt Using High-Level Synthesis and Register-Transfer Level Design Methodologies. |
FPL |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Bo Mi, Darong Huang, Shaohua Wan 0001, Libo Mi, Jianqiu Cao |
Oblivious Transfer Based on NTRUEncrypt. |
IEEE Access |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Wei Dai 0007, William Whyte, Zhenfei Zhang |
Optimizing Polynomial Convolution for NTRUEncrypt. |
IEEE Trans. Computers |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Wei Dai 0007, William Whyte, Zhenfei Zhang |
Optimizing polynomial convolution for NTRUEncrypt. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
28 | Yang Wang 0050, Mingqiang Wang |
Provably Secure NTRUEncrypt over Any Cyclotomic Field. |
SAC |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Farnoud Farahmand, Malik Umar Sharif, Kevin Briggs, Kris Gaj |
A High-Speed Constant-Time Hardware Implementation of NTRUEncrypt SVES. |
FPT |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Thomas Schamberger |
Post-quantum security: Power Analysis of NTRUEncrypt. |
Krypto-Tag |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Yang Yu, Guangwu Xu, Xiaoyun Wang 0001 |
Provably Secure NTRUEncrypt over More General Cyclotomic Rings. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
28 | Yang Wang 0050, Mingqiang Wang |
Efficient provable-secure NTRUEncrypt over any cyclotomic field. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
28 | Moustafa Mahmoud, Mouna Nakkar, Amr M. Youssef |
A power analysis resistant FPGA implementation of NTRUEncrypt. |
ICM |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Johanna Sepúlveda, Andreas Zankl, Oliver Mischke |
Cache attacks and countermeasures for NTRUEncrypt on MPSoCs: Post-quantum resistance for the IoT. |
SoCC |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang |
Choosing Parameters for NTRUEncrypt. |
CT-RSA |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Bo Mi, Dongyan Liu |
Topology-Hiding Broadcast Based on NTRUEncrypt. |
KSII Trans. Internet Inf. Syst. |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Bingxin Liu, Huapeng Wu |
Efficient multiplication architecture over truncated polynomial ring for NTRUEncrypt system. |
ISCAS |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang |
Choosing Parameters for NTRUEncrypt. |
IACR Cryptol. ePrint Arch. |
2015 |
DBLP BibTeX RDF |
|
28 | Bingxin Liu, Huapeng Wu |
Efficient architecture and implementation for NTRUEncrypt system. |
MWSCAS |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Abdel Alim Kamal, Amr M. Youssef |
Strengthening hardware implementations of NTRUEncrypt against fault analysis attacks. |
J. Cryptogr. Eng. |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Damien Stehlé, Ron Steinfeld |
Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices. |
IACR Cryptol. ePrint Arch. |
2013 |
DBLP BibTeX RDF |
|
28 | Abdel Alim Kamal, Amr M. Youssef |
A Scan-Based Side Channel Attack on the NTRUEncrypt Cryptosystem. |
ARES |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Ron Steinfeld, San Ling, Josef Pieprzyk, Christophe Tartary, Huaxiong Wang |
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | |
NTRUEncrypt. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Abdel Alim Kamal, Amr M. Youssef |
Fault Analysis of the NTRUEncrypt Cryptosystem. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Jeffrey Hoffstein, Nick Howgrave-Graham, Jill Pipher, William Whyte |
Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign. |
The LLL Algorithm |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Tommi Meskanen, Ari Renvall |
A wrap error attack against NTRUEncrypt. |
Discret. Appl. Math. |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Nick Howgrave-Graham, Joseph H. Silverman, William Whyte |
Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
23 | Nick Howgrave-Graham, Joseph H. Silverman, William Whyte |
Choosing Parameter Sets forwithand. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #38 of 38 (100 per page; Change: )
|
|