×

Found 89 Documents (Results 1–89)

100
MathJax

How to meet ternary LWE keys. (English) Zbl 1486.94131

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12826, 701-731 (2021).
MSC:  94A60 81P94 81P68
PDF BibTeX XML Cite
Full Text: DOI

Fast NEON-based multiplication for lattice-based NIST post-quantum cryptography finalists. (English) Zbl 07495916

Cheon, Jung Hee (ed.) et al., Post-quantum cryptography. 12th international workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12841, 234-254 (2021).
MSC:  68P25 94A60 81P94
PDF BibTeX XML Cite
Full Text: DOI

Achievable upper bound for the sup-norm of the product of elements of the ring of truncated polynomials and its application to the analysis of NTRU-like cryptosystems. (English. Russian original) Zbl 1469.94085

Cybern. Syst. Anal. 57, No. 2, 190-195 (2021); translation from Kibern. Sist. Anal. 57, No. 2, 23-29 (2021).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Cloud-assisted asynchronous key transport with post-quantum security. (English) Zbl 1464.68039

Liu, Joseph K. (ed.) et al., Information security and privacy. 25th Australasian conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12248, 82-101 (2020).
MSC:  68M25 68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI

Exploring trade-offs in batch bounded distance decoding. (English) Zbl 1453.94057

Paterson, Kenneth G. (ed.) et al., Selected areas in cryptography – SAC 2019. 26th international conference, Waterloo, ON, Canada, August 12–16, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11959, 467-491 (2020).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Fast authentication from aggregate signatures with improved security. (English) Zbl 1460.94075

Goldberg, Ian (ed.) et al., Financial cryptography and data security. 23rd international conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11598, 686-705 (2019).
MSC:  94A62
PDF BibTeX XML Cite
Full Text: DOI

BI-NTRU encryption schemes: two new secure variants of NTRU. (English) Zbl 1457.94177

Gueye, Cheikh Thiecoumba (ed.) et al., Algebra, codes and cryptology. Proceedings of the first international conference, A2C 2019, in honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5–7, 2019. Cham: Springer. Commun. Comput. Inf. Sci. 1133, 216-235 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Homomorphic encryption for finite automata. (English) Zbl 1455.94157

Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11922, 473-502 (2019).
MSC:  94A60 68Q45
PDF BibTeX XML Cite
Full Text: DOI

Cryptanalysis of an NTRU-based proxy encryption scheme from ASIACCS’15. (English) Zbl 07173862

Ding, Jintai (ed.) et al., Post-quantum cryptography. 10th international conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11505, 153-166 (2019).
MSC:  94A60 81P94
PDF BibTeX XML Cite
Full Text: DOI

Evaluating the potential for hardware acceleration of four NTRU-based key encapsulation mechanisms using software/hardware codesign. (English) Zbl 1455.94152

Ding, Jintai (ed.) et al., Post-quantum cryptography. 10th international conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11505, 23-43 (2019).
MSC:  94A60 81P94
PDF BibTeX XML Cite
Full Text: DOI

Faster multiplication in \(\mathbb{Z}_{2^m}[x]\) on Cortex-M4 to speed up NIST PQC candidates. (English) Zbl 1458.94246

Deng, Robert H. (ed.) et al., Applied cryptography and network security. 17th international conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11464, 281-301 (2019).
MSC:  94A60 68M07
PDF BibTeX XML Cite
Full Text: DOI

Decryption failure attacks on IND-CCA secure lattice-based schemes. (English) Zbl 07159418

Lin, Dongdai (ed.) et al., Public-key cryptography – PKC 2019. 22nd IACR international conference on practice and theory of public-key cryptography, Beijing, China, April 14–17, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11443, 565-598 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Provably secure NTRUEncrypt over any cyclotomic field. (English) Zbl 1447.94056

Cid, Carlos (ed.) et al., Selected areas in cryptography – SAC 2018. 25th international conference, Calgary, AB, Canada, August 15–17, 2018. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11349, 391-417 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

A lattice attack on homomorphic NTRU with non-invertible public keys. (English) Zbl 1452.94059

Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 248-254 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Cryptanalyses of branching program obfuscations over GGH13 multilinear map from the NTRU problem. (English) Zbl 1457.94112

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10993, 184-210 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Lattice Klepto – turning post-quantum crypto against itself. (English) Zbl 1384.94077

Adams, Carlisle (ed.) et al., Selected areas in cryptography – SAC 2017. 24th international conference, Ottawa, ON, Canada, August 16–18, 2017. Revised selected papers. Cham: Springer (ISBN 978-3-319-72564-2/pbk; 978-3-319-72565-9/ebook). Lecture Notes in Computer Science 10719, 336-354 (2018).
MSC:  94A60 81P94
PDF BibTeX XML Cite
Full Text: DOI

NTRU prime: reducing attack surface at low cost. (English) Zbl 1384.94034

Adams, Carlisle (ed.) et al., Selected areas in cryptography – SAC 2017. 24th international conference, Ottawa, ON, Canada, August 16–18, 2017. Revised selected papers. Cham: Springer (ISBN 978-3-319-72564-2/pbk; 978-3-319-72565-9/ebook). Lecture Notes in Computer Science 10719, 235-260 (2018).
MSC:  94A60 81P94
PDF BibTeX XML Cite
Full Text: DOI Link

High-speed key encapsulation from NTRU. (English) Zbl 1440.94058

Fischer, Wieland (ed.) et al., Cryptographic hardware and embedded systems – CHES 2017. 19th international conference, Taipei, Taiwan, September 25–28, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10529, 232-252 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Cold boot attacks on NTRU. (English) Zbl 1429.94064

Patra, Arpita (ed.) et al., Progress in cryptology – INDOCRYPT 2017. 18th international conference on cryptology in India, Chennai, India, December 10–13, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10698, 107-125 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

A practical implementation of identity-based encryption over NTRU lattices. (English) Zbl 1397.94089

O’Neill, Máire (ed.), Cryptography and coding. 16th IMA international conference, IMACC 2017, Oxford, UK, December 12–14, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-71044-0/pbk; 978-3-319-71045-7/ebook). Lecture Notes in Computer Science 10655, 227-246 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Provably secure NTRU instances over prime cyclotomic rings. (English) Zbl 1404.94122

Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-54364-1/pbk; 978-3-662-54365-8/ebook). Lecture Notes in Computer Science 10174, 409-434 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Cryptanalysis and improved construction of a group key agreement for secure group communication. (English) Zbl 1397.94109

Bishop, Matt (ed.) et al., Information security. 19th international conference, ISC 2016, Honolulu, HI, USA, September 3–6, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-45870-0/pbk; 978-3-319-45871-7/ebook). Lecture Notes in Computer Science 9866, 48-58 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

A subfield lattice attack on overstretched NTRU assumptions. Cryptanalysis of some FHE and graded encoding schemes. (English) Zbl 1351.94019

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53017-7/pbk; 978-3-662-53018-4/ebook). Lecture Notes in Computer Science 9814, 153-178 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

On the hardness of LWE with binary error: revisiting the hybrid lattice-reduction and meet-in-the-middle attack. (English) Zbl 1345.94045

Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2016. 8th international conference on cryptology in Africa, Fes, Morocco, April 13–15, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-31516-4/pbk; 978-3-319-31517-1/ebook). Lecture Notes in Computer Science 9646, 24-43 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Efficient identity-based encryption over NTRU lattices. (English) Zbl 1317.94103

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014, Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). Lecture Notes in Computer Science 8874, 22-41 (2014).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI Link

On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. (English) Zbl 1286.68114

Karloff, Howard J. (ed.) et al., Proceedings of the 44th annual ACM symposium on theory of computing, STOC 2012. New York, NY, USA, May 19–22, 2012. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1245-5). 1219-1234 (2012).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI Link

An algebraic broadcast attack against NTRU. (English) Zbl 1305.94041

Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 124-137 (2012).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

NTRUCCA: how to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model. (English) Zbl 1294.94079

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 353-371 (2012).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Lower bounds of shortest vector lengths in random NTRU lattices. (English) Zbl 1354.68274

Agrawal, Manindra (ed.) et al., Theory and applications of models of computation. 9th annual conference, TAMC 2012, Beijing, China, May 16–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29951-3/pbk). Lecture Notes in Computer Science 7287, 143-155 (2012).
MSC:  68U05 68Q30
PDF BibTeX XML Cite
Full Text: DOI Link

Making NTRU as secure as worst-case problems over ideal lattices. (English) Zbl 1281.94057

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 27-47 (2011).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Speed records for NTRU. (English) Zbl 1272.94035

Pieprzyk, Josef (ed.), Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11924-8/pbk). Lecture Notes in Computer Science 5985, 73-88 (2010).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Zero-knowledge protocols for NTRU: application to identification and proof of plaintext knowledge. (English) Zbl 1267.94104

Pieprzyk, Josef (ed.) et al., Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). Lecture Notes in Computer Science 5848, 198-213 (2009).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

MaTRU: A new NTRU-based cryptosystem. (English) Zbl 1153.94362

Maitra, Subhamoy (ed.) et al., Progress in cryptology – INDOCRYPT 2005. 6th international conference on cryptology in India, Bangalore, India, December 10–12, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30805-8/pbk). Lecture Notes in Computer Science 3797, 232-243 (2005).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Cryptanalysis of PASS II and MiniPass. (English) Zbl 1122.94419

Qing, Sihan (ed.) et al., Information and communications security. 7th international conference, ICICS 2005, Beijing, China, December 10–13, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30934-9/pbk). Lecture Notes in Computer Science 3783, 159-168 (2005).
MSC:  94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI

A faster lattice reduction method using quantum search. (English) Zbl 1205.68160

Ibaraki, Toshihide (ed.) et al., Algorithms and computation. 14th international symposium, ISAAC 2003, Kyoto, Japan, December 15–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20695-7/pbk). Lect. Notes Comput. Sci. 2906, 199-208 (2003).
MSC:  68Q12 68Q05 81P68 94A60
PDF BibTeX XML Cite
Full Text: DOI

Computing the \(M = UU^t\) integer matrix decomposition. (English) Zbl 1123.94338

Paterson, Kenneth G. (ed.), Cryptography and coding. 9th IMA international conference, Cirencester, UK, December 16–18, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20663-9/pbk). Lect. Notes Comput. Sci. 2898, 223-233 (2003).
MSC:  94A60 15B36
PDF BibTeX XML Cite
Full Text: DOI

The impact of decryption failures on the security of NTRU encryption. (English) Zbl 1122.94377

Boneh, Dan (ed.), Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40674-3/pbk). Lect. Notes Comput. Sci. 2729, 226-246 (2003).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Key recovery attacks on NTRU without ciphertext validation routine. (English) Zbl 1044.94528

Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9–11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 274-284 (2003).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: Link

Cryptanalysis of the revised NTRU signature scheme. (English) Zbl 1055.94015

Knudsen, Lars (ed.), Advances in cryptology - EUROCRYPT 2002. 21st international conference on the theory and applications of cryptographic techniques, Amsterdam, the Netherlands, April 28 – May 2, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43553-0). Lect. Notes Comput. Sci. 2332, 299-320 (2002).
MSC:  94A60 94A62 11H71
PDF BibTeX XML Cite
Full Text: Link

A variant of NTRU with non-invertible polynomials. (English) Zbl 1033.94510

Menezes, Alfred (ed.) et al., Progress in cryptology – INDOCRYPT 2002. Third international conference on cryptology in India, Hyderabad, India, December 16–18, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00263-4/pbk). Lect. Notes Comput. Sci. 2551, 62-70 (2002).
MSC:  94A60 11L07
PDF BibTeX XML Cite
Full Text: Link

Analysis and improvements of NTRU encryption paddings. (English) Zbl 1026.94538

Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 210-225 (2002).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: Link

Cryptanalysis of the NTRU signature scheme (NSS) from EUROCRYPT 2001. (English) Zbl 1062.94547

Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 1-20 (2001).
MSC:  94A60 68P25 94A62
PDF BibTeX XML Cite
Full Text: Link

NTRU in constrained devices. (English) Zbl 1012.94548

Koç, Çetin K. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2001. 3rd international workshop, Paris, France, May 14-16, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2162, 262-272 (2001).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: Link

NSS: an NTRU lattice-based signature scheme. (English) Zbl 0981.94039

Pfitzmann, Birgit (ed.), Advances in cryptology - EUROCRYPT 2001. 20th international conference on theory and application of cryptographic techniques, Innsbruck, Austria, May 6-10, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2045, 211-228 (2001).
MSC:  94A62
PDF BibTeX XML Cite
Full Text: Link

Optimizations for NTRU. (English) Zbl 0987.94027

Alster, Kazimierz (ed.) et al., Public-key cryptography and computational number theory. Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11-15, 2000. Berlin: de Gruyter. 77-88 (2001).
MSC:  94A60 11T71
PDF BibTeX XML Cite

Filter Results by …

Document Type

Reviewing State

all top 5

Author

all top 5

Year of Publication

all top 3

Classification

all top 3

Software