×

Found 24 Documents (Results 1–24)

Sealing the leak on classical NTRU signatures. (English) Zbl 1302.94057

Mosca, Michele (ed.), Post-quantum cryptography. 6th international workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1–3, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-11658-7/pbk). Lecture Notes in Computer Science 8772, 1-21 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Software speed records for lattice-based signatures. (English) Zbl 1306.94057

Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4–7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 67-82 (2013).
MSC:  94A60 81P94 94A62
PDFBibTeX XMLCite
Full Text: DOI

Learning a zonotope and more: cryptanalysis of ntrusign countermeasures. (English) Zbl 1292.94059

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 433-450 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Faster Gaussian lattice sampling using lazy floating-point arithmetic. (English) Zbl 1292.94058

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 415-432 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical lattice-based cryptography: a signature scheme for embedded systems. (English) Zbl 1294.94050

Prouff, Emmanuel (ed.) et al., Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33026-1/pbk). Lecture Notes in Computer Science 7428, 530-547 (2012).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

NTRUCCA: how to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model. (English) Zbl 1294.94079

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 353-371 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical lattice-based cryptography: NTRUEncrypt and NTRUSign. (English) Zbl 1191.94090

Nguyen, Phong Q. (ed.) et al., The LLL algorithm. Survey and applications. Dordrecht: Springer (ISBN 978-3-642-02294-4/hbk; 978-3-642-02295-1/ebook). Information Security and Cryptography, 349-390 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Zero-knowledge protocols for NTRU: application to identification and proof of plaintext knowledge. (English) Zbl 1267.94104

Pieprzyk, Josef (ed.) et al., Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). Lecture Notes in Computer Science 5848, 198-213 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Cryptography based on quadratic forms: Complexity considerations. (English) Zbl 1166.94313

Lucks, Stefan (ed.) et al., Research in cryptology. Second Western European workshop, WEWoRC 2007, Bochum, Germany, July 4–6, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-88352-4/pbk). Lecture Notes in Computer Science 4945, 52-64 (2008).
MSC:  94A60 11T71 11Y16
PDFBibTeX XMLCite
Full Text: DOI

Trapdoors for hard lattices and new cryptographic constructions. (English) Zbl 1231.68124

STOC’08. Proceedings of the 40th annual ACM symposium on theory of computing 2008, Victoria, Canada, May 17–20, 2008. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-047-0). 197-206 (2008).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Public key identification based on the equivalence of quadratic forms. (English) Zbl 1147.94316

Kučera, Luděk (ed.) et al., Mathematical foundations of computer science 2007. 32nd international symposium, MFCS 2007, Český Krumlov, Czech Republic, August 26–31, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74455-9/pbk). Lecture Notes in Computer Science 4708, 333-345 (2007).
MSC:  94A60 11T71 11Y16
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of SFLASH with slightly modified parameters. (English) Zbl 1141.94351

Naor, Moni (ed.), Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). Lecture Notes in Computer Science 4515, 264-275 (2007).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Learning a parallelepiped: cryptanalysis of GGH and NTRU signatures. (English) Zbl 1140.94365

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 271-288 (2006).
MSC:  94A60 94A62 11T71
PDFBibTeX XMLCite
Full Text: DOI

Symplectic lattice reduction and NTRU. (English) Zbl 1140.94339

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 233-253 (2006).
MSC:  94A60 11T71
PDFBibTeX XMLCite
Full Text: DOI

Weak property of malleability in NTRUSign. (English) Zbl 1098.94626

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 379-390 (2004).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

A group signature scheme with efficient membership revocation for reasonable groups. (English) Zbl 1098.94627

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 336-347 (2004).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

NTRUSign: Digital signatures using the NTRU lattice. (English) Zbl 1039.94525

Joye, Marc (ed.), Topics in cryptology – CT-RSA 2003. The cryptographers’ track at the RSA conference 2003, San Francisco, CA, USA, April 13–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00847-0/pbk). Lect. Notes Comput. Sci. 2612, 122-140 (2003).
MSC:  94A62 11H55
PDFBibTeX XMLCite
Full Text: Link

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software