scientific article
From MaRDI portal
Publication:2778851
zbMath0981.94039MaRDI QIDQ2778851
Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
Publication date: 21 March 2002
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2045/20450211
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
SoK: how (not) to design and implement post-quantum cryptography ⋮ Post-quantum cryptography: lattice signatures ⋮ Efficient Nyberg-Rueppel type of NTRU digital signature algorithm ⋮ Algebraic Cryptanalysis of CTRU Cryptosystem ⋮ Cryptanalysis of a code-based one-time signature ⋮ Fault analysis of the NTRUSign digital signature scheme ⋮ An efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using lattice ⋮ Lattice Klepto -- turning post-quantum crypto against itself ⋮ Symplectic Lattice Reduction and NTRU ⋮ Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures ⋮ Learning a parallelepiped: Cryptanalysis of GGH and NTRU signatures ⋮ Cryptanalysis of a rank-based signature with short public keys ⋮ A Subfield Lattice Attack on Overstretched NTRU Assumptions ⋮ Cryptography Based on Quadratic Forms: Complexity Considerations
Uses Software