scientific article; zbMATH DE number 2086714

From MaRDI portal
Publication:4737253

zbMath1055.94015MaRDI QIDQ4737253

Mike Szydlo, Craig Gentry

Publication date: 11 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2332/23320299.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (33)

On the lattice isomorphism problem, quadratic forms, remarkable lattices, and cryptographyLattices with symmetryMatrix product constraints by projection methodsEfficient Nyberg-Rueppel type of NTRU digital signature algorithmNTRU Fatigue: How Stretched is Overstretched?Lattice-based accumulator with constant time list update and constant time verificationDigital Signatures Based on the Hardness of Ideal Lattice Problems in All RingsJust how hard are rotations of \(\mathbb{Z}^n\)? Algorithms and cryptography with the simplest latticeA new offer of <scp>NTRU</scp> cryptosystem with two new key pairsNTRU over Galois ringsA polynomial time algorithm for breaking NTRU encryption with multiple keys\textsc{Hawk}: module LIP makes lattice signatures fast, compact and simpleLoop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signaturesFault analysis of the NTRUSign digital signature schemeKey exchange protocols over noncommutative rings. The case ofApproximate short vectors in ideal lattices of \(\mathbb{Q}(\zeta_{p^e})\) with precomputation of \({\mathrm {Cl}}(\mathcal{O}_K)\)Vulnerable public keys in NTRU cryptosystemProvably Secure NTRU Instances over Prime Cyclotomic RingsRevisiting Lattice Attacks on Overstretched NTRU ParametersComputing Generator in Cyclotomic Integer RingsShort Stickelberger Class Relations and Application to Ideal-SVPOn the quantum attacks against schemes relying on the hardness of finding a short generator of an ideal in \(\mathbb{Q}(\zeta_{2^s})\)Symplectic Lattice Reduction and NTRULearning a Parallelepiped: Cryptanalysis of GGH and NTRU SignaturesA Digital Signature Scheme Based on CVP  ∞Learning a parallelepiped: Cryptanalysis of GGH and NTRU signaturesKey recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU latticesTesting Isomorphism of Lattices over CM-OrdersA Subfield Lattice Attack on Overstretched NTRU AssumptionsAlgebraic Aspects of Solving Ring-LWE, Including Ring-Based Improvements in the Blum--Kalai--Wasserman AlgorithmFast reduction of algebraic lattices over cyclotomic fieldsGenerating cryptographically-strong random lattice bases and recognizing rotations of \(\mathbb{Z}^n\)On removing rejection conditions in practical lattice-based signatures




This page was built for publication: