## Found 13 Documents (Results 1–13)

100
MathJax

### Ring theory. (English)Zbl 1490.94058

Goethals, Paul L. (ed.) et al., Mathematics in cyber research. Boca Raton, FL: CRC Press. 475-495 (2022).
Full Text:

### How to find ternary LWE keys using locality sensitive hashing. (English)Zbl 1492.94130

Paterson, Maura B. (ed.), Cryptography and coding. 18th IMA international conference, IMACC 2021, virtual event, December 14–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13129, 247-264 (2021).
MSC:  94A60 68P25 68P10
Full Text:

Full Text:

### Improved security for a ring-based fully homomorphic encryption scheme. (English)Zbl 1317.94088

Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17–19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 45-64 (2013).
MSC:  94A60
Full Text:

### Making NTRU as secure as worst-case problems over ideal lattices. (English)Zbl 1281.94057

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 27-47 (2011).
MSC:  94A60
Full Text:

### NTRU over rings beyond $$\mathbb{Z}$$. (English)Zbl 1200.94050

MSC:  94A60 11T71 13G05
Full Text:

### On achieving chosen ciphertext security with decryption errors. (English)Zbl 1125.94016

Fossorier, Marc (ed.) et al., Applied algebra, algebraic algorithms and error-correcting codes. 16th international symposium, AAECC-16, Las Vegas, NV, USA, February 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-31423-7/pbk). Lecture Notes in Computer Science 3857, 173-182 (2006).
MSC:  94A60
Full Text:

### A faster lattice reduction method using quantum search. (English)Zbl 1205.68160

Ibaraki, Toshihide (ed.) et al., Algorithms and computation. 14th international symposium, ISAAC 2003, Kyoto, Japan, December 15–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20695-7/pbk). Lect. Notes Comput. Sci. 2906, 199-208 (2003).
MSC:  68Q12 68Q05 81P68 94A60
Full Text:

### Key recovery attacks on NTRU without ciphertext validation routine. (English)Zbl 1044.94528

Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9–11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 274-284 (2003).
MSC:  94A60
Full Text:

### On the bit security of NTRUEncrypt. (English)Zbl 1033.94535

Desmedt, Yvo G. (ed.) et al., Public key cryptography – PKC 2003. 6th international workshop on practice and theory in public key cryptography, Miami, FL, USA, January 6–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00324-X/pbk). Lect. Notes Comput. Sci. 2567, 62-70 (2002).
MSC:  94A60 68P25
Full Text:

### Analysis and improvements of NTRU encryption paddings. (English)Zbl 1026.94538

Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 210-225 (2002).
MSC:  94A60 68P25
Full Text:

### Optimizations for NTRU. (English)Zbl 0987.94027

Alster, Kazimierz (ed.) et al., Public-key cryptography and computational number theory. Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11-15, 2000. Berlin: de Gruyter. 77-88 (2001).
MSC:  94A60 11T71

### Lattice reduction in cryptology: An update. (English)Zbl 0980.94010

Bosma, Wieb (ed.), Algorithmic number theory. 4th international symposium. ANTS-IV, Leiden, the Netherlands, July 2-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1838, 85-112 (2000).
MSC:  94A60 11Y16

all top 5

all top 3

all top 3