BI-NTRU Encryption Schemes: Two New Secure Variants of NTRU
From MaRDI portal
Publication:3294884
DOI10.1007/978-3-030-36237-9_13zbMath1457.94177OpenAlexW2995087262MaRDI QIDQ3294884
Publication date: 29 June 2020
Published in: Algebra, Codes and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-36237-9_13
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
- A modular analysis of the Fujisaki-Okamoto transformation
- NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model
- Making NTRU as Secure as Worst-Case Problems over Ideal Lattices
- Lossy trapdoor functions and their applications
- On Ideal Lattices and Learning with Errors over Rings
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Secure integration of asymmetric and symmetric encryption schemes
- High-Speed Key Encapsulation from NTRU
- On Ideal Lattices and Learning with Errors over Rings
- On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
- Cryptography and Coding
- On lattices, learning with errors, random linear codes, and cryptography
This page was built for publication: BI-NTRU Encryption Schemes: Two New Secure Variants of NTRU