NTRU

From MaRDI portal
Revision as of 20:21, 5 March 2024 by Import240305080343 (talk | contribs) (Created automatically from import240305080343)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Software:23700



swMATH11761MaRDI QIDQ23700


No author found.

Source code repository: https://github.com/NTRUOpenSourceProject/ntru-crypto




Related Items (only showing first 100 items - show all)

On random nonsingular Hermite normal formSolving systems of polynomial equations with symmetries using SAGBI-Gröbner basesParallel symmetric attack on NTRU using non-deterministic lattice reductionSubtractive sets over cyclotomic rings. Limits of Schnorr-like arguments over latticesHow to meet ternary LWE keysA trace map attack against special ring-LWE samplesA scalable post-quantum hash-based group signatureHomomorphic AES evaluation using the modified LTV schemeAn efficient lattice reduction using reuse technique blockwisely on NTRUAn extension of Kannan's embedding for solving ring-based LWE problemsHow to find ternary LWE keys using locality sensitive hashingOn the higher-bit version of approximate inhomogeneous short integer solution problemTowards quantum large-scale password guessing on real-world distributionsUnnamed ItemTowards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable HardwareUnnamed ItemUnnamed ItemBootstrapping for approximate homomorphic encryptionFull Lattice Basis Reduction on Graphics CardsPost-quantum cryptography: lattice signaturesVandermonde meets Regev: public key encryption schemes based on partial Vandermonde problemsUnnamed Item\textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}Bootstrapping for helibA non-commutative cryptosystem based on quaternion algebrasBonsai trees, or how to delegate a lattice basisUnnamed ItemWhen NTT meets Karatsuba: preprocess-then-NTT technique revisitedFinding shortest lattice vectors faster using quantum searchPASS-encrypt: a public key cryptosystem based on partial evaluation of polynomialsNew transference theorems on lattices possessing \(n^\varepsilon\)-unique shortest vectorsSmall leaks sink a great ship: an evaluation of key reuse resilience of PQC third round finalist NTRU-HRSSA detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attackA novel identity-based multi-signature scheme over NTRU latticesA signature scheme from the finite field isomorphism problemEfficiently processing complex-valued data in homomorphic encryptionFlattening NTRU for evaluation key free homomorphic encryptionCharacterizing overstretched NTRU attacksRevisiting lower dimension lattice attacks on NTRUUnnamed ItemUnnamed ItemD-NTRU: more efficient and average-case IND-CPA secure NTRU variantCryptanalysis of the GGH cryptosystemA public key cryptosystem based on three new provable problemsCryptanalysis of a code-based one-time signatureRandom small Hamming weight products with applications to cryptographyLattice polly cracker cryptosystemsImprovements of algebraic attacks for solving the rank decoding and MinRank problemsTwisted-PHS: using the product formula to solve approx-SVP in ideal latticesFault analysis of the NTRUSign digital signature schemeSLAP: simpler, improved private stream aggregation from ring learning with errorsOn the (M)iNTRU assumption in the integer casePrimality testing and integer factorization in public-key cryptographyIdentity-based aggregate signcryption in the standard model from multilinear mapsGroup key agreement for secure group communication in dynamic peer systemsSTP-LWE: A variant of learning with error for a flexible encryptionEPiC: efficient privacy-preserving counting for MapReduceAn efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using latticeReduced Gröbner bases and Macaulay-Buchberger basis theorem over Noetherian ringsOn the geometry of cyclic latticesLower bounds of shortest vector lengths in random NTRU latticesQuantum algorithm design: techniques and applicationsETRU: NTRU over the Eisenstein integersAnalysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectorsGeneralized compact knapsacks, cyclic lattices, and efficient one-way functionsHow to securely outsource the extended Euclidean algorithm for large-scale polynomials over finite fields\(\mathrm{F}_4\)-invariant algorithm for computing SAGBI-Gröbner basesEnhancing Goldreich, Goldwasser and Halevi's scheme with intersecting latticesA wrap error attack against NTRUEncryptNTRU over rings beyond \(\mathbb{Z}\)CHIMERA: combining ring-LWE-based fully homomorphic encryption schemesA framework for cryptographic problems from linear algebraFinding Shortest Lattice Vectors in the Presence of GapsAn experimental comparison of some LLL-type lattice basis reduction algorithmsIdentity based blind signature scheme over NTRU latticesPost-Quantum Cryptography: State of the ArtLearning a parallelepiped: Cryptanalysis of GGH and NTRU signaturesEvaluating the potential for hardware acceleration of four NTRU-based key encapsulation mechanisms using software/hardware codesignModular lattice signatures, revisitedAn algebraic attack on rank metric code-based cryptosystemsCryptanalysis of a rank-based signature with short public keysParallel Implementation of BDD Enumeration for LWEThe Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEsOn the distribution of low Hamming weight productsA Subfield Lattice Attack on Overstretched NTRU AssumptionsEfficient Algorithms for Supersingular Isogeny Diffie-HellmanFull Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate SignaturesAttribute-Based Encryption for Circuits from Multilinear MapsLattice-based revocable certificateless signatureCovert authentication from latticesA new post-quantum multivariate polynomial public key encapsulation algorithmDistinguishing attack on the NTRUCipher encryption schemeImproved lattice enumeration algorithms by primal and dual reordering methodsWorst-case to average-case reductions for module latticesImproved Security for a Ring-Based Fully Homomorphic Encryption SchemeDistribution of inverses in polynomial ringsQuantum key search for ternary LWEImplementation of lattice trapdoors on modules and applicationsOn removing rejection conditions in practical lattice-based signaturesAn algebraic approach to the rank support learning problem


This page was built for software: NTRU