Papachristoudis, Dimitris G.; Halkidis, Spyros T.; Stephanides, George An experimental comparison of some LLL-type lattice basis reduction algorithms. (English) Zbl 1392.11097 Int. J. Appl. Comput. Math. 1, No. 3, 327-342 (2015). MSC: 11Y16 68W30 94A60 68P25 PDFBibTeX XMLCite \textit{D. G. Papachristoudis} et al., Int. J. Appl. Comput. Math. 1, No. 3, 327--342 (2015; Zbl 1392.11097) Full Text: DOI
Wei, Wei; Liu, Mingjie; Wang, Xiaoyun Finding shortest lattice vectors in the presence of gaps. (English) Zbl 1332.94083 Nyberg, Kaisa (ed.), Topics in cryptology – CT-RSA 2015. The cryptographer’s track at the RSA conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-16714-5/pbk; 978-3-319-16715-2/ebook). Lecture Notes in Computer Science 9048, 239-257 (2015). MSC: 94A60 68W25 PDFBibTeX XMLCite \textit{W. Wei} et al., Lect. Notes Comput. Sci. 9048, 239--257 (2015; Zbl 1332.94083) Full Text: DOI
Kirchner, Paul; Fouque, Pierre-Alain An improved BKW algorithm for LWE with applications to cryptography and lattices. (English) Zbl 1336.94058 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 43-62 (2015). MSC: 94A60 68W30 PDFBibTeX XMLCite \textit{P. Kirchner} and \textit{P.-A. Fouque}, Lect. Notes Comput. Sci. 9215, 43--62 (2015; Zbl 1336.94058) Full Text: DOI arXiv
Laarhoven, Thijs Sieving for shortest vectors in lattices using angular locality-sensitive hashing. (English) Zbl 1336.94060 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 3-22 (2015). MSC: 94A60 68W30 PDFBibTeX XMLCite \textit{T. Laarhoven}, Lect. Notes Comput. Sci. 9215, 3--22 (2015; Zbl 1336.94060) Full Text: DOI
Wang, Maoning; Liu, Mingjie Improved information set decoding for code-based cryptosystems with constrained memory. (English) Zbl 1408.94994 Wang, Jianxin (ed.) et al., Frontiers in algorithmics. 9th international workshop, FAW 2015, Guilin, China, July 3–5, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9130, 241-258 (2015). MSC: 94B35 94A15 PDFBibTeX XMLCite \textit{M. Wang} and \textit{M. Liu}, Lect. Notes Comput. Sci. 9130, 241--258 (2015; Zbl 1408.94994) Full Text: DOI
Hoffstein, Jeffrey; Silverman, Joseph H. PASS-encrypt: a public key cryptosystem based on partial evaluation of polynomials. (English) Zbl 1356.94061 Des. Codes Cryptography 77, No. 2-3, 541-552 (2015). MSC: 94A60 94A62 65T50 PDFBibTeX XMLCite \textit{J. Hoffstein} and \textit{J. H. Silverman}, Des. Codes Cryptography 77, No. 2--3, 541--552 (2015; Zbl 1356.94061) Full Text: DOI
Laarhoven, Thijs; Mosca, Michele; van de Pol, Joop Finding shortest lattice vectors faster using quantum search. (English) Zbl 1356.94069 Des. Codes Cryptography 77, No. 2-3, 375-400 (2015). MSC: 94A60 68Q12 81P68 PDFBibTeX XMLCite \textit{T. Laarhoven} et al., Des. Codes Cryptography 77, No. 2--3, 375--400 (2015; Zbl 1356.94069) Full Text: DOI OA License
Ducas, Léo; Micciancio, Daniele FHEW: bootstrapping homomorphic encryption in less than a second. (English) Zbl 1370.94509 Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 617-640 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Ducas} and \textit{D. Micciancio}, Lect. Notes Comput. Sci. 9056, 617--640 (2015; Zbl 1370.94509) Full Text: DOI Link
Pöppelmann, Thomas; Oder, Tobias; Güneysu, Tim High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers. (English) Zbl 1378.94061 Lauter, Kristin (ed.) et al., Progress in cryptology – LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 346-365 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Pöppelmann} et al., Lect. Notes Comput. Sci. 9230, 346--365 (2015; Zbl 1378.94061) Full Text: DOI
Langlois, Adeline; Stehlé, Damien Worst-case to average-case reductions for module lattices. (English) Zbl 1361.94043 Des. Codes Cryptography 75, No. 3, 565-599 (2015). MSC: 94A60 68Q17 PDFBibTeX XMLCite \textit{A. Langlois} and \textit{D. Stehlé}, Des. Codes Cryptography 75, No. 3, 565--599 (2015; Zbl 1361.94043) Full Text: DOI
Jarvis, Katherine; Nevins, Monica ETRU: NTRU over the Eisenstein integers. (English) Zbl 1303.94085 Des. Codes Cryptography 74, No. 1, 219-242 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Jarvis} and \textit{M. Nevins}, Des. Codes Cryptography 74, No. 1, 219--242 (2015; Zbl 1303.94085) Full Text: DOI
Gao, Bo; Shi, Yanfeng; Yang, Chunli; Li, Lixiang; Wang, Licheng; Yang, Yixian STP-LWE: A variant of learning with error for a flexible encryption. (English) Zbl 1407.94106 Math. Probl. Eng. 2014, Article ID 341490, 7 p. (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{B. Gao} et al., Math. Probl. Eng. 2014, Article ID 341490, 7 p. (2014; Zbl 1407.94106) Full Text: DOI
Langlois, Adeline; Stehlé, Damien; Steinfeld, Ron GGHLite: more efficient multilinear maps from ideal lattices. (English) Zbl 1332.94071 Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 239-256 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Langlois} et al., Lect. Notes Comput. Sci. 8441, 239--256 (2014; Zbl 1332.94071) Full Text: DOI
Bos, Joppe W.; Lauter, Kristin; Loftus, Jake; Naehrig, Michael Improved security for a ring-based fully homomorphic encryption scheme. (English) Zbl 1317.94088 Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17–19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 45-64 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{J. W. Bos} et al., Lect. Notes Comput. Sci. 8308, 45--64 (2013; Zbl 1317.94088) Full Text: DOI Link
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Sahai, Amit; Waters, Brent Attribute-based encryption for circuits from multilinear maps. (English) Zbl 1311.94080 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 479-499 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 8043, 479--499 (2013; Zbl 1311.94080) Full Text: DOI
Hohenberger, Susan; Sahai, Amit; Waters, Brent Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures. (English) Zbl 1310.94151 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 494-512 (2013). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Hohenberger} et al., Lect. Notes Comput. Sci. 8042, 494--512 (2013; Zbl 1310.94151) Full Text: DOI
López-Alt, Adriana; Tromer, Eran; Vaikuntanathan, Vinod On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. (English) Zbl 1286.68114 Karloff, Howard J. (ed.) et al., Proceedings of the 44th annual ACM symposium on theory of computing, STOC 2012. New York, NY, USA, May 19–22, 2012. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1245-5). 1219-1234 (2012). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{A. López-Alt} et al., in: Proceedings of the 44th annual ACM symposium on theory of computing, STOC 2012. New York, NY, USA, May 19--22, 2012. New York, NY: Association for Computing Machinery (ACM). 1219--1234 (2012; Zbl 1286.68114) Full Text: DOI
Kamal, Abdel Alim; Youssef, Amr M. Fault analysis of the NTRUSign digital signature scheme. (English) Zbl 1282.94048 Cryptogr. Commun. 4, No. 2, 131-144 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{A. A. Kamal} and \textit{A. M. Youssef}, Cryptogr. Commun. 4, No. 2, 131--144 (2012; Zbl 1282.94048) Full Text: DOI
Ducas, Léo; Nguyen, Phong Q. Learning a zonotope and more: cryptanalysis of ntrusign countermeasures. (English) Zbl 1292.94059 Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 433-450 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Ducas} and \textit{P. Q. Nguyen}, Lect. Notes Comput. Sci. 7658, 433--450 (2012; Zbl 1292.94059) Full Text: DOI
Ducas, Léo; Nguyen, Phong Q. Faster Gaussian lattice sampling using lazy floating-point arithmetic. (English) Zbl 1292.94058 Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 415-432 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Ducas} and \textit{P. Q. Nguyen}, Lect. Notes Comput. Sci. 7658, 415--432 (2012; Zbl 1292.94058) Full Text: DOI
Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris Bonsai trees, or how to delegate a lattice basis. (English) Zbl 1277.94017 J. Cryptology 25, No. 4, 601-639 (2012). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D. Cash} et al., J. Cryptology 25, No. 4, 601--639 (2012; Zbl 1277.94017) Full Text: DOI Link
Güneysu, Tim; Lyubashevsky, Vadim; Pöppelmann, Thomas Practical lattice-based cryptography: a signature scheme for embedded systems. (English) Zbl 1294.94050 Prouff, Emmanuel (ed.) et al., Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33026-1/pbk). Lecture Notes in Computer Science 7428, 530-547 (2012). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{T. Güneysu} et al., Lect. Notes Comput. Sci. 7428, 530--547 (2012; Zbl 1294.94050) Full Text: DOI
Göttert, Norman; Feller, Thomas; Schneider, Michael; Buchmann, Johannes; Huss, Sorin On the design of hardware building blocks for modern lattice-based encryption schemes. (English) Zbl 1294.94048 Prouff, Emmanuel (ed.) et al., Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33026-1/pbk). Lecture Notes in Computer Science 7428, 512-529 (2012). MSC: 94A60 68P25 65T50 PDFBibTeX XMLCite \textit{N. Göttert} et al., Lect. Notes Comput. Sci. 7428, 512--529 (2012; Zbl 1294.94048) Full Text: DOI
Lv, Xixiang; Li, Hui; Wang, Baocang Group key agreement for secure group communication in dynamic peer systems. (English) Zbl 1248.68068 J. Parallel Distrib. Comput. 72, No. 10, 1195-1200 (2012). MSC: 68M10 94A60 68M14 PDFBibTeX XMLCite \textit{X. Lv} et al., J. Parallel Distrib. Comput. 72, No. 10, 1195--1200 (2012; Zbl 1248.68068) Full Text: DOI
Bartkewitz, Timo; Güneysu, Tim Full lattice basis reduction on graphics cards. (English) Zbl 1305.68080 Armknecht, Frederik (ed.) et al., Research in cryptology. 4th Western European workshop, WEWoRC 2011, Weimar, Germany, July 20–22, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34158-8/pbk). Lecture Notes in Computer Science 7242, 30-44 (2012). MSC: 68P25 94A60 68W10 PDFBibTeX XMLCite \textit{T. Bartkewitz} and \textit{T. Güneysu}, Lect. Notes Comput. Sci. 7242, 30--44 (2012; Zbl 1305.68080) Full Text: DOI
Pöppelmann, Thomas; Güneysu, Tim Towards efficient arithmetic for lattice-based cryptography on reconfigurable hardware. (English) Zbl 1303.94099 Hevia, Alejandro (ed.) et al., Progress in cryptology – LATINCRYPT 2012. 2nd international conference on cryptology and information security in Latin America, Santiago, Chile, October 7–10, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33480-1/pbk). Lecture Notes in Computer Science 7533, 139-158 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Pöppelmann} and \textit{T. Güneysu}, Lect. Notes Comput. Sci. 7533, 139--158 (2012; Zbl 1303.94099) Full Text: DOI
Su, Shenghui; Lü, Shuwang A public key cryptosystem based on three new provable problems. (English) Zbl 1243.68176 Theor. Comput. Sci. 426-427, 91-117 (2012). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{S. Su} and \textit{S. Lü}, Theor. Comput. Sci. 426--427, 91--117 (2012; Zbl 1243.68176) Full Text: DOI
Chen, Yuanmi; Nguyen, Phong Q. BKZ 2.0: Better lattice security estimates. (English) Zbl 1227.94037 Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 1-20 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Chen} and \textit{P. Q. Nguyen}, Lect. Notes Comput. Sci. 7073, 1--20 (2011; Zbl 1227.94037) Full Text: DOI
Brakerski, Zvika; Vaikuntanathan, Vinod Fully homomorphic encryption from ring-LWE and security for key dependent messages. (English) Zbl 1290.94051 Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 505-524 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{Z. Brakerski} and \textit{V. Vaikuntanathan}, Lect. Notes Comput. Sci. 6841, 505--524 (2011; Zbl 1290.94051) Full Text: DOI
Hanrot, Guillaume; Pujol, Xavier; Stehlé, Damien Analyzing blockwise lattice algorithms using dynamical systems. (English) Zbl 1287.94072 Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 447-464 (2011). MSC: 94A60 68Q25 11H06 PDFBibTeX XMLCite \textit{G. Hanrot} et al., Lect. Notes Comput. Sci. 6841, 447--464 (2011; Zbl 1287.94072) Full Text: DOI
Stehlé, Damien; Steinfeld, Ron Making NTRU as secure as worst-case problems over ideal lattices. (English) Zbl 1281.94057 Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 27-47 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Stehlé} and \textit{R. Steinfeld}, Lect. Notes Comput. Sci. 6632, 27--47 (2011; Zbl 1281.94057) Full Text: DOI
Nguyen, Phong Q. Lattice reduction algorithms: theory and practice. (English) Zbl 1281.94046 Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 2-6 (2011). MSC: 94A60 11Y16 68W30 PDFBibTeX XMLCite \textit{P. Q. Nguyen}, Lect. Notes Comput. Sci. 6632, 2--6 (2011; Zbl 1281.94046) Full Text: DOI
Caboara, Massimo; Caruso, Fabrizio; Traverso, Carlo Lattice polly cracker cryptosystems. (English) Zbl 1213.94088 J. Symb. Comput. 46, No. 5, 534-549 (2011). Reviewer: Juan Tena Ayuso (Valladolid) MSC: 94A60 13P10 11H06 PDFBibTeX XMLCite \textit{M. Caboara} et al., J. Symb. Comput. 46, No. 5, 534--549 (2011; Zbl 1213.94088) Full Text: DOI
Lindner, Richard; Peikert, Chris Better key sizes (and attacks) for LWE-based encryption. (English) Zbl 1284.94088 Kiayias, Aggelos (ed.), Topics in cryptology – CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 319-339 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Lindner} and \textit{C. Peikert}, Lect. Notes Comput. Sci. 6558, 319--339 (2011; Zbl 1284.94088) Full Text: DOI
Wang, Houzhen; Zhang, Huanguo; Guan, Haiming; Han, Haiqing A new perturbation algorithm and enhancing security of SFLASH signature scheme. (English) Zbl 1497.94149 Sci. China, Inf. Sci. 53, No. 4, 760-768 (2010). MSC: 94A62 PDFBibTeX XMLCite \textit{H. Wang} et al., Sci. China, Inf. Sci. 53, No. 4, 760--768 (2010; Zbl 1497.94149) Full Text: DOI
Micciancio, Daniele; Voulgaris, Panagiotis Faster exponential time algorithms for the shortest vector problem. (English) Zbl 1288.94076 Charikar, Moses (ed.), Proceedings of the 21st annual ACM-SIAM symposium on discrete algorithms, SODA 2010, Austin, TX, USA, January 17–19, 2010. Philadelphia, PA: Society for Industrial and Applied Mathematics (SIAM); New York, NY: Association for Computing Machinery (ACM) (ISBN 978-0-89871-698-6/CD-ROM). 1468-1480 (2010). MSC: 94A60 68Q25 PDFBibTeX XMLCite \textit{D. Micciancio} and \textit{P. Voulgaris}, in: Proceedings of the 21st annual ACM-SIAM symposium on discrete algorithms, SODA 2010, Austin, TX, USA, January 17--19, 2010. Philadelphia, PA: Society for Industrial and Applied Mathematics (SIAM); New York, NY: Association for Computing Machinery (ACM). 1468--1480 (2010; Zbl 1288.94076)
Lee, Moon Sung; Hahn, Sang Geun Cryptanalysis of the GGH cryptosystem. (English) Zbl 1205.94088 Math. Comput. Sci. 3, No. 2, 201-208 (2010). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{M. S. Lee} and \textit{S. G. Hahn}, Math. Comput. Sci. 3, No. 2, 201--208 (2010; Zbl 1205.94088) Full Text: DOI
Peikert, Chris An efficient and parallel Gaussian sampler for lattices. (English) Zbl 1280.94091 Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 80-97 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Peikert}, Lect. Notes Comput. Sci. 6223, 80--97 (2010; Zbl 1280.94091) Full Text: DOI
Nevins, Monica; KarimianPour, Camelia; Miri, Ali NTRU over rings beyond \(\mathbb{Z}\). (English) Zbl 1200.94050 Des. Codes Cryptography 56, No. 1, 65-78 (2010). Reviewer: Robert Fitzgerald (Carbondale) MSC: 94A60 11T71 13G05 PDFBibTeX XMLCite \textit{M. Nevins} et al., Des. Codes Cryptography 56, No. 1, 65--78 (2010; Zbl 1200.94050) Full Text: DOI
Smart, N. P.; Vercauteren, F. Fully homomorphic encryption with relatively small key and ciphertext sizes. (English) Zbl 1281.94055 Nguyen, Phong Q. (ed.) et al., Public key cryptography – PKC 2010. 13th international conference on practice and theory in public key cryptography, Paris, France, May 26–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13012-0/pbk). Lecture Notes in Computer Science 6056, 420-443 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{N. P. Smart} and \textit{F. Vercauteren}, Lect. Notes Comput. Sci. 6056, 420--443 (2010; Zbl 1281.94055) Full Text: DOI
Hermans, Jens; Schneider, Michael; Buchmann, Johannes; Vercauteren, Frederik; Preneel, Bart Parallel shortest lattice vector enumeration on graphics cards. (English) Zbl 1284.68638 Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 52-68 (2010). MSC: 68W10 94A60 PDFBibTeX XMLCite \textit{J. Hermans} et al., Lect. Notes Comput. Sci. 6055, 52--68 (2010; Zbl 1284.68638) Full Text: DOI Link
Lyubashevsky, Vadim Fiat-Shamir with aborts: applications to lattice and factoring-based signatures. (English) Zbl 1267.94125 Matsui, Mitsuru (ed.), Advances in cryptology – ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6–10, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10365-0/pbk). Lecture Notes in Computer Science 5912, 598-616 (2009). MSC: 94A62 PDFBibTeX XMLCite \textit{V. Lyubashevsky}, Lect. Notes Comput. Sci. 5912, 598--616 (2009; Zbl 1267.94125) Full Text: DOI
Xagawa, Keita; Tanaka, Keisuke Zero-knowledge protocols for NTRU: application to identification and proof of plaintext knowledge. (English) Zbl 1267.94104 Pieprzyk, Josef (ed.) et al., Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). Lecture Notes in Computer Science 5848, 198-213 (2009). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{K. Xagawa} and \textit{K. Tanaka}, Lect. Notes Comput. Sci. 5848, 198--213 (2009; Zbl 1267.94104) Full Text: DOI
Lyubashevsky, Vadim; Micciancio, Daniele On bounded distance decoding, unique shortest vectors, and the minimum distance problem. (English) Zbl 1252.94084 Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 577-594 (2009). MSC: 94A60 94B35 PDFBibTeX XMLCite \textit{V. Lyubashevsky} and \textit{D. Micciancio}, Lect. Notes Comput. Sci. 5677, 577--594 (2009; Zbl 1252.94084) Full Text: DOI
Buchmann, Johannes; Lindner, Richard; Rückert, Markus; Schneider, Michael Post-quantum cryptography: lattice signatures. (English) Zbl 1170.94010 Computing 85, No. 1-2, 105-125 (2009). Reviewer: Guy Jumarie (Montréal) MSC: 94A60 81P68 PDFBibTeX XMLCite \textit{J. Buchmann} et al., Computing 85, No. 1--2, 105--125 (2009; Zbl 1170.94010) Full Text: DOI
Berger, Thierry P.; Cayrel, Pierre-Louis; Gaborit, Philippe; Otmani, Ayoub Reducing key length of the McEliece cryptosystem. (English) Zbl 1246.94022 Preneel, Bart (ed.), Progress in cryptology – AFRICACRYPT 2009. Second international conference on cryptology in Africa, Gammarth, Tunisia, June 21–25, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02383-5/pbk). Lecture Notes in Computer Science 5580, 77-97 (2009). MSC: 94A60 94B15 PDFBibTeX XMLCite \textit{T. P. Berger} et al., Lect. Notes Comput. Sci. 5580, 77--97 (2009; Zbl 1246.94022) Full Text: DOI HAL
Nguyen, Phong Q.; Regev, Oded Learning a parallelepiped: Cryptanalysis of GGH and NTRU signatures. (English) Zbl 1159.94369 J. Cryptology 22, No. 2, 139-160 (2009). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{P. Q. Nguyen} and \textit{O. Regev}, J. Cryptology 22, No. 2, 139--160 (2009; Zbl 1159.94369) Full Text: DOI
Ajtai, Miklós Representing hard lattices with \(O(n\log n)\) bits. (English) Zbl 1286.94056 Chic. J. Theor. Comput. Sci. 2008, Article No. 2, 40 p. (2008). MSC: 94A60 68M12 PDFBibTeX XMLCite \textit{M. Ajtai}, Chic. J. Theor. Comput. Sci. 2008, Article No. 2, 40 p. (2008; Zbl 1286.94056) Full Text: DOI
Pujol, Xavier; Stehlé, Damien Rigorous and efficient short lattice vectors enumeration. (English) Zbl 1206.94086 Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 390-405 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{X. Pujol} and \textit{D. Stehlé}, Lect. Notes Comput. Sci. 5350, 390--405 (2008; Zbl 1206.94086) Full Text: DOI
Buchmann, Johannes; Lindner, Richard; Rückert, Markus Explicit hard instances of the shortest vector problem. (English) Zbl 1177.94132 Buchmann, Johannes (ed.) et al., Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17–19, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88402-6/pbk). Lecture Notes in Computer Science 5299, 79-94 (2008). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{J. Buchmann} et al., Lect. Notes Comput. Sci. 5299, 79--94 (2008; Zbl 1177.94132) Full Text: DOI
Lyubashevsky, Vadim; Micciancio, Daniele; Peikert, Chris; Rosen, Alon SWIFFT: a modest proposal for FFT hashing. (English) Zbl 1154.68403 Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 54-72 (2008). MSC: 94A60 65T50 68P25 68N99 PDFBibTeX XMLCite \textit{V. Lyubashevsky} et al., Lect. Notes Comput. Sci. 5086, 54--72 (2008; Zbl 1154.68403) Full Text: DOI
Mol, Petros; Yung, Moti Recovering NTRU secret key from inversion oracles. (English) Zbl 1162.94393 Cramer, Ronald (ed.), Public key cryptography – PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78440-1/pbk). Lecture Notes in Computer Science 4939, 18-36 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{P. Mol} and \textit{M. Yung}, Lect. Notes Comput. Sci. 4939, 18--36 (2008; Zbl 1162.94393) Full Text: DOI
Howgrave-Graham, Nick A hybrid lattice-reduction and meet-in-the-middle attack against NTRU. (English) Zbl 1215.94053 Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 150-169 (2007). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Howgrave-Graham}, Lect. Notes Comput. Sci. 4622, 150--169 (2007; Zbl 1215.94053) Full Text: DOI
Micciancio, Daniele Generalized compact knapsacks, cyclic lattices, and efficient one-way functions. (English) Zbl 1133.68024 Comput. Complexity 16, No. 4, 365-411 (2007). MSC: 68Q17 11H06 94A60 94B15 PDFBibTeX XMLCite \textit{D. Micciancio}, Comput. Complexity 16, No. 4, 365--411 (2007; Zbl 1133.68024) Full Text: DOI OA License
Kawachi, Akinori; Tanaka, Keisuke; Xagawa, Keita Multi-bit cryptosystems based on lattice problems. (English) Zbl 1161.94411 Okamoto, Tatsuaki (ed.) et al., Public key cryptography – PKC 2007. 10th international conference on practice and theory in public-key cryptography, Beijing, China, April 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-71676-1/pbk). Lecture Notes in Computer Science 4450, 315-329 (2007). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Kawachi} et al., Lect. Notes Comput. Sci. 4450, 315--329 (2007; Zbl 1161.94411) Full Text: DOI
Han, Daewan; Kim, Myung-Hwan; Yeom, Yongjin Cryptanalysis of the Paeng-Jung-Ha cryptosystem from PKC 2003. (English) Zbl 1127.94015 Okamoto, Tatsuaki (ed.) et al., Public key cryptography – PKC 2007. 10th international conference on practice and theory in public-key cryptography, Beijing, China, April 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-71676-1/pbk). Lecture Notes in Computer Science 4450, 107-117 (2007). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Han} et al., Lect. Notes Comput. Sci. 4450, 107--117 (2007; Zbl 1127.94015) Full Text: DOI
Calmels, Benoît; Canard, Sébastien; Girault, Marc; Sibert, Hervé Low-cost cryptography for privacy in RFID systems. (English) Zbl 1333.94032 Domingo-Ferrer, Josep (ed.) et al., Smart card research and advanced applications. 7th IFIP WG 8.8/11.2 international conference, CARDIS 2006, Tarragona, Spain, April 19–21, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-33311-1/pbk; 978-3-540-33312-8/ebook). Lecture Notes in Computer Science 3928, 237-251 (2006). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{B. Calmels} et al., Lect. Notes Comput. Sci. 3928, 237--251 (2006; Zbl 1333.94032) Full Text: DOI
Nguyen, Phong Q.; Regev, Oded Learning a parallelepiped: cryptanalysis of GGH and NTRU signatures. (English) Zbl 1140.94365 Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 271-288 (2006). MSC: 94A60 94A62 11T71 PDFBibTeX XMLCite \textit{P. Q. Nguyen} and \textit{O. Regev}, Lect. Notes Comput. Sci. 4004, 271--288 (2006; Zbl 1140.94365) Full Text: DOI
Gama, Nicolas; Howgrave-Graham, Nick; Nguyen, Phong Q. Symplectic lattice reduction and NTRU. (English) Zbl 1140.94339 Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 233-253 (2006). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{N. Gama} et al., Lect. Notes Comput. Sci. 4004, 233--253 (2006; Zbl 1140.94339) Full Text: DOI
Lyubashevsky, Vadim; Micciancio, Daniele Generalized compact knapsacks are collision resistant. (English) Zbl 1133.68353 Bugliesi, Michele (ed.) et al., Automata, languages and programming. 33rd international colloquium, ICALP 2006, Venice, Italy, July 10–14, 2006. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-35907-4/pbk). Lecture Notes in Computer Science 4052, 144-155 (2006). MSC: 68Q17 68Q25 94A60 PDFBibTeX XMLCite \textit{V. Lyubashevsky} and \textit{D. Micciancio}, Lect. Notes Comput. Sci. 4052, 144--155 (2006; Zbl 1133.68353) Full Text: DOI
Meskanen, Tommi; Renvall, Ari A wrap error attack against NTRUEncrypt. (English) Zbl 1091.94025 Discrete Appl. Math. 154, No. 2, 382-391 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Meskanen} and \textit{A. Renvall}, Discrete Appl. Math. 154, No. 2, 382--391 (2006; Zbl 1091.94025) Full Text: DOI
Nguyêñ, Phong Q.; Stern, Jacques Adapting density attacks to low-weight knapsacks. (English) Zbl 1142.94354 Roy, Bimal (ed.), Advances in cryptology – ASIACRYPT 2005. 11th international conference on the theory and application of cryptology and information security, Chennai, India, December 4–8, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30684-9/pbk). Lecture Notes in Computer Science 3788, 41-58 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Q. Nguyêñ} and \textit{J. Stern}, Lect. Notes Comput. Sci. 3788, 41--58 (2005; Zbl 1142.94354) Full Text: DOI
Coglianese, Michael; Goi, Bok-Min MaTRU: A new NTRU-based cryptosystem. (English) Zbl 1153.94362 Maitra, Subhamoy (ed.) et al., Progress in cryptology – INDOCRYPT 2005. 6th international conference on cryptology in India, Bangalore, India, December 10–12, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30805-8/pbk). Lecture Notes in Computer Science 3797, 232-243 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Coglianese} and \textit{B.-M. Goi}, Lect. Notes Comput. Sci. 3797, 232--243 (2005; Zbl 1153.94362) Full Text: DOI
Howgrave-Graham, Nick; Silverman, Joseph H.; Whyte, William Choosing parameter sets for NTRUEncrypt with NAEP and SVES-3. (English) Zbl 1079.94553 Menezes, Alfred (ed.), Topics in cryptology – CT-RSA 2005. The cryptographers’ track at the RSA conference 2005, San Francisco, CA, USA, February 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24399-2/pbk). Lecture Notes in Computer Science 3376, 118-135 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Howgrave-Graham} et al., Lect. Notes Comput. Sci. 3376, 118--135 (2005; Zbl 1079.94553) Full Text: DOI
Dwork, Cynthia; Naor, Moni; Reingold, Omer Immunizing encryption schemes from decryption errors. (English) Zbl 1122.94369 Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 342-360 (2004). MSC: 94A60 94B35 PDFBibTeX XMLCite \textit{C. Dwork} et al., Lect. Notes Comput. Sci. 3027, 342--360 (2004; Zbl 1122.94369) Full Text: DOI
Weimerskirch, André; Westhoff, Dirk Zero common-knowledge authentication for pervasive networks. (English) Zbl 1081.94540 Matsui, Mitsuru (ed.) et al., Selected areas in cryptography. 10th annual international workshop, SAC 2003, Ottawa, Canada, August 14–15, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21370-8/pbk). Lecture Notes in Computer Science 3006, 73-87 (2004). MSC: 94A62 94A60 94C99 PDFBibTeX XMLCite \textit{A. Weimerskirch} and \textit{D. Westhoff}, Lect. Notes Comput. Sci. 3006, 73--87 (2004; Zbl 1081.94540) Full Text: DOI
Min, SungJun; Yamamoto, Go; Kim, Kwangjo Weak property of malleability in NTRUSign. (English) Zbl 1098.94626 Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 379-390 (2004). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{S. Min} et al., Lect. Notes Comput. Sci. 3108, 379--390 (2004; Zbl 1098.94626) Full Text: DOI
Nakanishi, Toru; Sugiyama, Yuji A group signature scheme with efficient membership revocation for reasonable groups. (English) Zbl 1098.94627 Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 336-347 (2004). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{T. Nakanishi} and \textit{Y. Sugiyama}, Lect. Notes Comput. Sci. 3108, 336--347 (2004; Zbl 1098.94627) Full Text: DOI
Feldhofer, Martin; Dominikus, Sandra; Wolkerstorfer, Johannes Strong authentication for RFID systems using the AES algorithm. (English) Zbl 1104.68471 Joye, Marc (ed.) et al., Cryptographic hardware and embedded systems – CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11–13, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22666-4/pbk). Lecture Notes in Computer Science 3156, 357-370 (2004). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{M. Feldhofer} et al., Lect. Notes Comput. Sci. 3156, 357--370 (2004; Zbl 1104.68471) Full Text: DOI
Seidel, Tanya E.; Socek, Daniel; Sramka, Michal Parallel symmetric attack on NTRU using non-deterministic lattice reduction. (English) Zbl 1050.94013 Des. Codes Cryptography 32, No. 1-3, 369-379 (2004). MSC: 94A60 15A21 60G50 11H55 PDFBibTeX XMLCite \textit{T. E. Seidel} et al., Des. Codes Cryptography 32, No. 1--3, 369--379 (2004; Zbl 1050.94013) Full Text: DOI
Yan, Song Y. Primality testing and integer factorization in public-key cryptography. (English) Zbl 1048.11103 Advances in Information Security 11. Boston MA: Kluwer Academic Publishers (ISBN 1-4020-7649-5/hbk). xvi, 236 p. (2004). Reviewer: Juan Tena Ayuso (Valladolid) MSC: 11Y11 11Y05 94A60 11-01 PDFBibTeX XMLCite \textit{S. Y. Yan}, Primality testing and integer factorization in public-key cryptography. Boston MA: Kluwer Academic Publishers (2004; Zbl 1048.11103)
Ludwig, Christoph A faster lattice reduction method using quantum search. (English) Zbl 1205.68160 Ibaraki, Toshihide (ed.) et al., Algorithms and computation. 14th international symposium, ISAAC 2003, Kyoto, Japan, December 15–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20695-7/pbk). Lect. Notes Comput. Sci. 2906, 199-208 (2003). MSC: 68Q12 68Q05 81P68 94A60 PDFBibTeX XMLCite \textit{C. Ludwig}, Lect. Notes Comput. Sci. 2906, 199--208 (2003; Zbl 1205.68160) Full Text: DOI
Howgrave-Graham, Nick; Nguyen, Phong Q.; Pointcheval, David; Proos, John; Silverman, Joseph H.; Singer, Ari; Whyte, William The impact of decryption failures on the security of NTRU encryption. (English) Zbl 1122.94377 Boneh, Dan (ed.), Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40674-3/pbk). Lect. Notes Comput. Sci. 2729, 226-246 (2003). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Howgrave-Graham} et al., Lect. Notes Comput. Sci. 2729, 226--246 (2003; Zbl 1122.94377) Full Text: DOI
Han, Daewan; Hong, Jin; Han, Jae Woo; Kwon, Daesung Key recovery attacks on NTRU without ciphertext validation routine. (English) Zbl 1044.94528 Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9–11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 274-284 (2003). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Han} et al., Lect. Notes Comput. Sci. 2727, 274--284 (2003; Zbl 1044.94528) Full Text: Link
Lee, Eonkyung; Park, Je Hong Cryptanalysis of the public-key encryption based on braid groups. (English) Zbl 1038.94541 Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 477-490 (2003). MSC: 94A60 20F36 PDFBibTeX XMLCite \textit{E. Lee} and \textit{J. H. Park}, Lect. Notes Comput. Sci. 2656, 477--490 (2003; Zbl 1038.94541) Full Text: Link
Szydlo, Michael Hypercubic lattice reduction and analysis of GGH and NTRU signatures. (English) Zbl 1038.94558 Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 433-448 (2003). MSC: 94A62 94A60 11H71 11Y16 PDFBibTeX XMLCite \textit{M. Szydlo}, Lect. Notes Comput. Sci. 2656, 433--448 (2003; Zbl 1038.94558) Full Text: Link
Boneh, Dan; Gentry, Craig; Lynn, Ben; Shacham, Hovav Aggregate and verifiably encrypted signatures from bilinear maps. (English) Zbl 1038.94553 Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 416-432 (2003). MSC: 94A62 94A60 68P25 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 2656, 416--432 (2003; Zbl 1038.94553) Full Text: Link
Hoffstein, Jeffrey; Silverman, Joseph H. Random small Hamming weight products with applications to cryptography. (English) Zbl 1028.94023 Discrete Appl. Math. 130, No. 1, 37-49 (2003). MSC: 94A60 11T71 14G50 11Y40 PDFBibTeX XMLCite \textit{J. Hoffstein} and \textit{J. H. Silverman}, Discrete Appl. Math. 130, No. 1, 37--49 (2003; Zbl 1028.94023) Full Text: DOI
Hoffstein, Jeffrey; Howgrave-Graham, Nick; Pipher, Jill; Silverman, Joseph H.; Whyte, William NTRUSign: Digital signatures using the NTRU lattice. (English) Zbl 1039.94525 Joye, Marc (ed.), Topics in cryptology – CT-RSA 2003. The cryptographers’ track at the RSA conference 2003, San Francisco, CA, USA, April 13–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00847-0/pbk). Lect. Notes Comput. Sci. 2612, 122-140 (2003). MSC: 94A62 11H55 PDFBibTeX XMLCite \textit{J. Hoffstein} et al., Lect. Notes Comput. Sci. 2612, 122--140 (2003; Zbl 1039.94525) Full Text: Link
Micciancio, Daniele; Goldwasser, Shafi Complexity of lattice problems. A cryptographic perspective. (English) Zbl 1140.94010 The Kluwer International Series in Engineering and Computer Science 671. Boston, MA: Kluwer Academic Publishers (ISBN 0-7923-7688-9/hbk). x, 220 p. (2002). MSC: 94A60 94-02 05B40 52B55 68-02 68P25 68Q15 68Q25 PDFBibTeX XMLCite \textit{D. Micciancio} and \textit{S. Goldwasser}, Complexity of lattice problems. A cryptographic perspective. Boston, MA: Kluwer Academic Publishers (2002; Zbl 1140.94010)
Lenstra, Arjen K. Computational methods in public key cryptology. (English) Zbl 1040.11095 Niederreiter, Harald (ed.), Coding theory and cryptology. River Edge, NJ: World Scientific (ISBN 981-238-132-5/hbk). Lect. Notes Ser., Inst. Math. Sci., Natl. Univ. Singap. 1, 175-238 (2002). Reviewer: Tanja Lange (Bochum) MSC: 11Yxx 11T71 11Y05 11Y11 14G50 11Y16 94A60 PDFBibTeX XMLCite \textit{A. K. Lenstra}, Lect. Notes Ser., Inst. Math. Sci., Natl. Univ. Singap. 1, 175--238 (2002; Zbl 1040.11095)
Sarma, Sanjay E.; Weis, Stephen A.; Engels, Daniel W. RFID systems and security and privacy implications. (English) Zbl 1019.68578 Kaliski, Burton S. jun. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2002. 4th international workshop, Redwood Shores, CA, USA, August 13-15, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2523, 454-469 (2002). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{S. E. Sarma} et al., Lect. Notes Comput. Sci. 2523, 454--469 (2002; Zbl 1019.68578) Full Text: Link
Paeng, Seong-Hun; Jung, Bae Eun; Ha, Kil-Chan A lattice based public key cryptosystem using polynomial representations. (English) Zbl 1033.94537 Desmedt, Yvo G. (ed.) et al., Public key cryptography – PKC 2003. 6th international workshop on practice and theory in public key cryptography, Miami, FL, USA, January 6–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00324-X/pbk). Lect. Notes Comput. Sci. 2567, 292-308 (2002). MSC: 94A60 68P25 11Y16 PDFBibTeX XMLCite \textit{S.-H. Paeng} et al., Lect. Notes Comput. Sci. 2567, 292--308 (2002; Zbl 1033.94537) Full Text: DOI
Galindo, David; Martín, Sebastià; Morillo, Paz; Villar, Jorge L. A practical public key cryptosystem from Paillier and Rabin schemes. (English) Zbl 1033.94523 Desmedt, Yvo G. (ed.) et al., Public key cryptography – PKC 2003. 6th international workshop on practice and theory in public key cryptography, Miami, FL, USA, January 6–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00324-X/pbk). Lect. Notes Comput. Sci. 2567, 279-291 (2002). MSC: 94A60 11Y05 PDFBibTeX XMLCite \textit{D. Galindo} et al., Lect. Notes Comput. Sci. 2567, 279--291 (2002; Zbl 1033.94523) Full Text: DOI
Nguyen, Phong Q.; Pointcheval, David Analysis and improvements of NTRU encryption paddings. (English) Zbl 1026.94538 Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 210-225 (2002). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{P. Q. Nguyen} and \textit{D. Pointcheval}, Lect. Notes Comput. Sci. 2442, 210--225 (2002; Zbl 1026.94538) Full Text: Link
Gentry, Craig; Jonsson, Jakob; Stern, Jacques; Szydlo, Michael Cryptanalysis of the NTRU signature scheme (NSS) from EUROCRYPT 2001. (English) Zbl 1062.94547 Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 1-20 (2001). MSC: 94A60 68P25 94A62 PDFBibTeX XMLCite \textit{C. Gentry} et al., Lect. Notes Comput. Sci. 2248, 1--20 (2001; Zbl 1062.94547) Full Text: Link
Micciancio, Daniele Improving lattice based cryptosystems using the Hermite normal form. (English) Zbl 1006.94529 Silverman, Joseph H. (ed.), Cryptography and lattices. 1st international conference, CaLC 2001, Providence, RI, USA, March 29-30, 2001. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2146, 126-145 (2001). MSC: 94A60 11H06 11Y16 PDFBibTeX XMLCite \textit{D. Micciancio}, Lect. Notes Comput. Sci. 2146, 126--145 (2001; Zbl 1006.94529) Full Text: Link
May, Alexander; Silverman, Joseph H. Dimension reduction methods for convolution modular lattices. (English) Zbl 1006.11033 Silverman, Joseph H. (ed.), Cryptography and lattices. 1st international conference, CaLC 2001, Providence, RI, USA, March 29-30, 2001. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2146, 110-125 (2001). MSC: 11H55 94A60 68Q10 11T71 PDFBibTeX XMLCite \textit{A. May} and \textit{J. H. Silverman}, Lect. Notes Comput. Sci. 2146, 110--125 (2001; Zbl 1006.11033) Full Text: Link
Banks, William D.; Shparlinski, Igor E. Distribution of inverses in polynomial rings. (English) Zbl 1095.13534 Indag. Math., New Ser. 12, No. 3, 303-315 (2001). MSC: 13F20 94A60 PDFBibTeX XMLCite \textit{W. D. Banks} and \textit{I. E. Shparlinski}, Indag. Math., New Ser. 12, No. 3, 303--315 (2001; Zbl 1095.13534) Full Text: DOI
Hoffstein, Jeffrey; Pipher, Jill; Silverman, Joseph H. NSS: an NTRU lattice-based signature scheme. (English) Zbl 0981.94039 Pfitzmann, Birgit (ed.), Advances in cryptology - EUROCRYPT 2001. 20th international conference on theory and application of cryptographic techniques, Innsbruck, Austria, May 6-10, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2045, 211-228 (2001). MSC: 94A62 PDFBibTeX XMLCite \textit{J. Hoffstein} et al., Lect. Notes Comput. Sci. 2045, 211--228 (2001; Zbl 0981.94039) Full Text: Link
Gentry, Craig Key recovery and message attacks on NTRU-composite. (English) Zbl 0981.94013 Pfitzmann, Birgit (ed.), Advances in cryptology - EUROCRYPT 2001. 20th international conference on theory and application of cryptographic techniques, Innsbruck, Austria, May 6-10, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2045, 182-194 (2001). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{C. Gentry}, Lect. Notes Comput. Sci. 2045, 182--194 (2001; Zbl 0981.94013) Full Text: Link
Hoffstein, Jeffrey; Silverman, Joseph Optimizations for NTRU. (English) Zbl 0987.94027 Alster, Kazimierz (ed.) et al., Public-key cryptography and computational number theory. Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11-15, 2000. Berlin: de Gruyter. 77-88 (2001). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{J. Hoffstein} and \textit{J. Silverman}, in: Public-key cryptography and computational number theory. Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11--15, 2000. Berlin: de Gruyter. 77--88 (2001; Zbl 0987.94027)
Bao, Feng; Deng, Robert H.; Geiselmann, Willi; Schnorr, Claus; Steinwandt, Rainer; Wu, Hongjun Cryptanalysis of two sparse polynomial based public key cryptosystems. (English) Zbl 0988.94510 Kim, Kwangjo (ed.), Public key cryptography. 4th international workshop on practice and theory in public key cryptosystems, PKC 2001. Cheju Island, Korea, February 13-15, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1992, 153-164 (2001). MSC: 94A60 PDFBibTeX XMLCite \textit{F. Bao} et al., Lect. Notes Comput. Sci. 1992, 153--164 (2001; Zbl 0988.94510)
Okamoto, Tatsuaki; Pointcheval, David REACT: Rapid enhanced-security asymmetric cryptosystem transform. (English) Zbl 0991.94046 Naccache, David (ed.), Topics in cryptology - CT-RSA 2001. The cryptographer’s track at RSA conference 2001, San Francisco, CA, USA, April 8-12, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2020, 159-175 (2001). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{T. Okamoto} and \textit{D. Pointcheval}, Lect. Notes Comput. Sci. 2020, 159--175 (2001; Zbl 0991.94046)
Nguyen, Phong Q.; Stern, Jacques Lattice reduction in cryptology: An update. (English) Zbl 0980.94010 Bosma, Wieb (ed.), Algorithmic number theory. 4th international symposium. ANTS-IV, Leiden, the Netherlands, July 2-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1838, 85-112 (2000). Reviewer: Tao Renji (Beijing) MSC: 94A60 11Y16 PDFBibTeX XMLCite \textit{P. Q. Nguyen} and \textit{J. Stern}, Lect. Notes Comput. Sci. 1838, 85--112 (2000; Zbl 0980.94010)
Clark, John A.; Jacob, Jeremy L. Two-stage optimisation in the design of Boolean functions. (English) Zbl 0963.94508 Dawson, Ed (ed.) et al., Information security and privacy. 5th Australasian conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1841, 242-254 (2000). MSC: 94A60 PDFBibTeX XMLCite \textit{J. A. Clark} and \textit{J. L. Jacob}, Lect. Notes Comput. Sci. 1841, 242--254 (2000; Zbl 0963.94508)