scientific article; zbMATH DE number 2081055
From MaRDI portal
Publication:4474162
zbMATH Open1062.94547MaRDI QIDQ4474162FDOQ4474162
Authors: Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo
Publication date: 4 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2248/22480001.htm
Title of this publication is not available (Why is that?)
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cited In (18)
- SoK: how (not) to design and implement post-quantum cryptography
- Cryptanalysis of the TRMS Signature Scheme of PKC’05
- Vulnerable public keys in NTRU cryptosystem
- Learning a parallelepiped: Cryptanalysis of GGH and NTRU signatures
- Title not available (Why is that?)
- Cryptography and Coding
- A new offer of <scp>NTRU</scp> cryptosystem with two new key pairs
- A Countermeasure for Protecting NTRUSign against the Transcript Attack
- Analysis of rainbow tables with fingerprints
- Title not available (Why is that?)
- Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures
- Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures
- Key recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU lattices
- Post-quantum cryptography: lattice signatures
- Title not available (Why is that?)
- Fault analysis of the NTRUSign digital signature scheme
- Information Security and Privacy
- Symplectic Lattice Reduction and NTRU
Uses Software
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4474162)