×

Found 13 Documents (Results 1–13)

100
MathJax

How to find ternary LWE keys using locality sensitive hashing. (English) Zbl 1492.94130

Paterson, Maura B. (ed.), Cryptography and coding. 18th IMA international conference, IMACC 2021, virtual event, December 14–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13129, 247-264 (2021).
MSC:  94A60 68P25 68P10
PDF BibTeX XML Cite
Full Text: DOI

Improved security for a ring-based fully homomorphic encryption scheme. (English) Zbl 1317.94088

Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17–19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 45-64 (2013).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Making NTRU as secure as worst-case problems over ideal lattices. (English) Zbl 1281.94057

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 27-47 (2011).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

On achieving chosen ciphertext security with decryption errors. (English) Zbl 1125.94016

Fossorier, Marc (ed.) et al., Applied algebra, algebraic algorithms and error-correcting codes. 16th international symposium, AAECC-16, Las Vegas, NV, USA, February 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-31423-7/pbk). Lecture Notes in Computer Science 3857, 173-182 (2006).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

A faster lattice reduction method using quantum search. (English) Zbl 1205.68160

Ibaraki, Toshihide (ed.) et al., Algorithms and computation. 14th international symposium, ISAAC 2003, Kyoto, Japan, December 15–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20695-7/pbk). Lect. Notes Comput. Sci. 2906, 199-208 (2003).
MSC:  68Q12 68Q05 81P68 94A60
PDF BibTeX XML Cite
Full Text: DOI

Key recovery attacks on NTRU without ciphertext validation routine. (English) Zbl 1044.94528

Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9–11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 274-284 (2003).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: Link

On the bit security of NTRUEncrypt. (English) Zbl 1033.94535

Desmedt, Yvo G. (ed.) et al., Public key cryptography – PKC 2003. 6th international workshop on practice and theory in public key cryptography, Miami, FL, USA, January 6–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00324-X/pbk). Lect. Notes Comput. Sci. 2567, 62-70 (2002).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Analysis and improvements of NTRU encryption paddings. (English) Zbl 1026.94538

Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 210-225 (2002).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: Link

Optimizations for NTRU. (English) Zbl 0987.94027

Alster, Kazimierz (ed.) et al., Public-key cryptography and computational number theory. Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11-15, 2000. Berlin: de Gruyter. 77-88 (2001).
MSC:  94A60 11T71
PDF BibTeX XML Cite

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Classification

all top 3

Software