Hu, Yupu; Lei, Hao; Wang, Fenghe; Zhang, Wenzheng Gaussian sampling of lattices for cryptographic applications. (English) Zbl 1357.94067 Sci. China, Inf. Sci. 57, No. 7, Article ID 072112, 8 p. (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Hu} et al., Sci. China, Inf. Sci. 57, No. 7, Article ID 072112, 8 p. (2014; Zbl 1357.94067) Full Text: DOI Link
Melchor, Carlos Aguilar; Boyen, Xavier; Deneuville, Jean-Christophe; Gaborit, Philippe Sealing the leak on classical NTRU signatures. (English) Zbl 1302.94057 Mosca, Michele (ed.), Post-quantum cryptography. 6th international workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1–3, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-11658-7/pbk). Lecture Notes in Computer Science 8772, 1-21 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{C. A. Melchor} et al., Lect. Notes Comput. Sci. 8772, 1--21 (2014; Zbl 1302.94057) Full Text: DOI
Güneysu, Tim; Oder, Tobias; Pöppelmann, Thomas; Schwabe, Peter Software speed records for lattice-based signatures. (English) Zbl 1306.94057 Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4–7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 67-82 (2013). MSC: 94A60 81P94 94A62 PDFBibTeX XMLCite \textit{T. Güneysu} et al., Lect. Notes Comput. Sci. 7932, 67--82 (2013; Zbl 1306.94057) Full Text: DOI
Kamal, Abdel Alim; Youssef, Amr M. Fault analysis of the NTRUSign digital signature scheme. (English) Zbl 1282.94048 Cryptogr. Commun. 4, No. 2, 131-144 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{A. A. Kamal} and \textit{A. M. Youssef}, Cryptogr. Commun. 4, No. 2, 131--144 (2012; Zbl 1282.94048) Full Text: DOI
Ducas, Léo; Nguyen, Phong Q. Learning a zonotope and more: cryptanalysis of ntrusign countermeasures. (English) Zbl 1292.94059 Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 433-450 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Ducas} and \textit{P. Q. Nguyen}, Lect. Notes Comput. Sci. 7658, 433--450 (2012; Zbl 1292.94059) Full Text: DOI
Ducas, Léo; Nguyen, Phong Q. Faster Gaussian lattice sampling using lazy floating-point arithmetic. (English) Zbl 1292.94058 Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 415-432 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Ducas} and \textit{P. Q. Nguyen}, Lect. Notes Comput. Sci. 7658, 415--432 (2012; Zbl 1292.94058) Full Text: DOI
Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris Bonsai trees, or how to delegate a lattice basis. (English) Zbl 1277.94017 J. Cryptology 25, No. 4, 601-639 (2012). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D. Cash} et al., J. Cryptology 25, No. 4, 601--639 (2012; Zbl 1277.94017) Full Text: DOI Link
Güneysu, Tim; Lyubashevsky, Vadim; Pöppelmann, Thomas Practical lattice-based cryptography: a signature scheme for embedded systems. (English) Zbl 1294.94050 Prouff, Emmanuel (ed.) et al., Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33026-1/pbk). Lecture Notes in Computer Science 7428, 530-547 (2012). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{T. Güneysu} et al., Lect. Notes Comput. Sci. 7428, 530--547 (2012; Zbl 1294.94050) Full Text: DOI
Steinfeld, Ron; Ling, San; Pieprzyk, Josef; Tartary, Christophe; Wang, Huaxiong NTRUCCA: how to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model. (English) Zbl 1294.94079 Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 353-371 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Steinfeld} et al., Lect. Notes Comput. Sci. 7293, 353--371 (2012; Zbl 1294.94079) Full Text: DOI
Peikert, Chris An efficient and parallel Gaussian sampler for lattices. (English) Zbl 1280.94091 Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 80-97 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Peikert}, Lect. Notes Comput. Sci. 6223, 80--97 (2010; Zbl 1280.94091) Full Text: DOI
Hoffstein, Jeff; Howgrave-Graham, Nick; Pipher, Jill; Whyte, William Practical lattice-based cryptography: NTRUEncrypt and NTRUSign. (English) Zbl 1191.94090 Nguyen, Phong Q. (ed.) et al., The LLL algorithm. Survey and applications. Dordrecht: Springer (ISBN 978-3-642-02294-4/hbk; 978-3-642-02295-1/ebook). Information Security and Cryptography, 349-390 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Hoffstein} et al., in: The LLL algorithm. Survey and applications. Dordrecht: Springer. 349--390 (2010; Zbl 1191.94090) Full Text: DOI
Xagawa, Keita; Tanaka, Keisuke Zero-knowledge protocols for NTRU: application to identification and proof of plaintext knowledge. (English) Zbl 1267.94104 Pieprzyk, Josef (ed.) et al., Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). Lecture Notes in Computer Science 5848, 198-213 (2009). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{K. Xagawa} and \textit{K. Tanaka}, Lect. Notes Comput. Sci. 5848, 198--213 (2009; Zbl 1267.94104) Full Text: DOI
Nguyen, Phong Q.; Regev, Oded Learning a parallelepiped: Cryptanalysis of GGH and NTRU signatures. (English) Zbl 1159.94369 J. Cryptology 22, No. 2, 139-160 (2009). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{P. Q. Nguyen} and \textit{O. Regev}, J. Cryptology 22, No. 2, 139--160 (2009; Zbl 1159.94369) Full Text: DOI
Hartung, Rupert J.; Schnorr, Claus-Peter Identification and signatures based on NP-hard problems of indefinite quadratic forms. (English) Zbl 1163.11027 J. Math. Cryptol. 2, No. 4, 327-341 (2008). Reviewer: Guillermo Morales-Luna (Mexico) MSC: 11E20 94A60 68W30 11D09 11R29 PDFBibTeX XMLCite \textit{R. J. Hartung} and \textit{C.-P. Schnorr}, J. Math. Cryptol. 2, No. 4, 327--341 (2008; Zbl 1163.11027) Full Text: DOI
Hu, Yupu; Wang, Baocang; He, Wencai NTRUSign with a new perturbation. (English) Zbl 1329.94064 IEEE Trans. Inf. Theory 54, No. 7, 3216-3221 (2008). MSC: 94A60 90C90 94A62 PDFBibTeX XMLCite \textit{Y. Hu} et al., IEEE Trans. Inf. Theory 54, No. 7, 3216--3221 (2008; Zbl 1329.94064) Full Text: DOI
Hartung, Rupert J. Cryptography based on quadratic forms: Complexity considerations. (English) Zbl 1166.94313 Lucks, Stefan (ed.) et al., Research in cryptology. Second Western European workshop, WEWoRC 2007, Bochum, Germany, July 4–6, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-88352-4/pbk). Lecture Notes in Computer Science 4945, 52-64 (2008). MSC: 94A60 11T71 11Y16 PDFBibTeX XMLCite \textit{R. J. Hartung}, Lect. Notes Comput. Sci. 4945, 52--64 (2008; Zbl 1166.94313) Full Text: DOI
Gentry, Craig; Peikert, Chris; Vaikuntanathan, Vinod Trapdoors for hard lattices and new cryptographic constructions. (English) Zbl 1231.68124 STOC’08. Proceedings of the 40th annual ACM symposium on theory of computing 2008, Victoria, Canada, May 17–20, 2008. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-047-0). 197-206 (2008). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{C. Gentry} et al., in: Proceedings of the 40th annual ACM symposium on theory of computing, STOC 2008. Victoria, Canada, May 17--20, 2008. New York, NY: Association for Computing Machinery (ACM). 197--206 (2008; Zbl 1231.68124) Full Text: DOI
Hartung, Rupert J.; Schnorr, Claus-Peter Public key identification based on the equivalence of quadratic forms. (English) Zbl 1147.94316 Kučera, Luděk (ed.) et al., Mathematical foundations of computer science 2007. 32nd international symposium, MFCS 2007, Český Krumlov, Czech Republic, August 26–31, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74455-9/pbk). Lecture Notes in Computer Science 4708, 333-345 (2007). MSC: 94A60 11T71 11Y16 PDFBibTeX XMLCite \textit{R. J. Hartung} and \textit{C.-P. Schnorr}, Lect. Notes Comput. Sci. 4708, 333--345 (2007; Zbl 1147.94316) Full Text: DOI
Dubois, Vivien; Fouque, Pierre-Alain; Stern, Jacques Cryptanalysis of SFLASH with slightly modified parameters. (English) Zbl 1141.94351 Naor, Moni (ed.), Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). Lecture Notes in Computer Science 4515, 264-275 (2007). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{V. Dubois} et al., Lect. Notes Comput. Sci. 4515, 264--275 (2007; Zbl 1141.94351) Full Text: DOI
Nguyen, Phong Q.; Regev, Oded Learning a parallelepiped: cryptanalysis of GGH and NTRU signatures. (English) Zbl 1140.94365 Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 271-288 (2006). MSC: 94A60 94A62 11T71 PDFBibTeX XMLCite \textit{P. Q. Nguyen} and \textit{O. Regev}, Lect. Notes Comput. Sci. 4004, 271--288 (2006; Zbl 1140.94365) Full Text: DOI
Gama, Nicolas; Howgrave-Graham, Nick; Nguyen, Phong Q. Symplectic lattice reduction and NTRU. (English) Zbl 1140.94339 Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 233-253 (2006). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{N. Gama} et al., Lect. Notes Comput. Sci. 4004, 233--253 (2006; Zbl 1140.94339) Full Text: DOI
Min, SungJun; Yamamoto, Go; Kim, Kwangjo Weak property of malleability in NTRUSign. (English) Zbl 1098.94626 Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 379-390 (2004). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{S. Min} et al., Lect. Notes Comput. Sci. 3108, 379--390 (2004; Zbl 1098.94626) Full Text: DOI
Nakanishi, Toru; Sugiyama, Yuji A group signature scheme with efficient membership revocation for reasonable groups. (English) Zbl 1098.94627 Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 336-347 (2004). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{T. Nakanishi} and \textit{Y. Sugiyama}, Lect. Notes Comput. Sci. 3108, 336--347 (2004; Zbl 1098.94627) Full Text: DOI
Hoffstein, Jeffrey; Howgrave-Graham, Nick; Pipher, Jill; Silverman, Joseph H.; Whyte, William NTRUSign: Digital signatures using the NTRU lattice. (English) Zbl 1039.94525 Joye, Marc (ed.), Topics in cryptology – CT-RSA 2003. The cryptographers’ track at the RSA conference 2003, San Francisco, CA, USA, April 13–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00847-0/pbk). Lect. Notes Comput. Sci. 2612, 122-140 (2003). MSC: 94A62 11H55 PDFBibTeX XMLCite \textit{J. Hoffstein} et al., Lect. Notes Comput. Sci. 2612, 122--140 (2003; Zbl 1039.94525) Full Text: Link