scientific article; zbMATH DE number 2081055
From MaRDI portal
Publication:4474162
Recommendations
Cited in
(18)- SoK: how (not) to design and implement post-quantum cryptography
- Cryptanalysis of the TRMS Signature Scheme of PKC’05
- Vulnerable public keys in NTRU cryptosystem
- Learning a parallelepiped: Cryptanalysis of GGH and NTRU signatures
- scientific article; zbMATH DE number 2086714 (Why is no real title available?)
- Cryptography and Coding
- A new offer of <scp>NTRU</scp> cryptosystem with two new key pairs
- A Countermeasure for Protecting NTRUSign against the Transcript Attack
- Analysis of rainbow tables with fingerprints
- scientific article; zbMATH DE number 1962147 (Why is no real title available?)
- Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures
- Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures
- Key recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU lattices
- Post-quantum cryptography: lattice signatures
- scientific article; zbMATH DE number 1722680 (Why is no real title available?)
- Fault analysis of the NTRUSign digital signature scheme
- Symplectic Lattice Reduction and NTRU
- Information Security and Privacy
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4474162)