NTRU
From MaRDI portal
Software:23700
swMATH11761MaRDI QIDQ23700FDOQ23700
Author name not available (Why is that?)
Source code repository: https://github.com/NTRUOpenSourceProject/ntru-crypto
Cited In (only showing first 100 items - show all)
- Cryptanalysis of a code-based one-time signature
- Parallel Implementation of BDD Enumeration for LWE
- Distinguishing attack on the NTRUCipher encryption scheme
- Improved lattice enumeration algorithms by primal and dual reordering methods
- GGHLite: More Efficient Multilinear Maps from Ideal Lattices
- When NTT meets Karatsuba: preprocess-then-NTT technique revisited
- Distribution of inverses in polynomial rings
- Quantum algorithm design: techniques and applications
- Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware
- An extension of Kannan's embedding for solving ring-based LWE problems
- How to securely outsource the extended Euclidean algorithm for large-scale polynomials over finite fields
- Improvements of algebraic attacks for solving the rank decoding and MinRank problems
- Floating-Point LLL: Theoretical and Practical Aspects
- A Practical Public Key Cryptosystem from Paillier and Rabin Schemes
- \(\mathrm{F}_4\)-invariant algorithm for computing SAGBI-Gröbner bases
- An algebraic approach to the rank support learning problem
- Implementation of lattice trapdoors on modules and applications
- On removing rejection conditions in practical lattice-based signatures
- Quantum key search for ternary LWE
- Compact Privacy Protocols from Post-quantum and Timed Classical Assumptions
- Parallel symmetric attack on NTRU using non-deterministic lattice reduction
- Bootstrapping for approximate homomorphic encryption
- Primality testing and integer factorization in public-key cryptography
- Enhancing Goldreich, Goldwasser and Halevi's scheme with intersecting lattices
- Short Generators Without Quantum Computers: The Case of Multiquadratics
- Short Stickelberger Class Relations and Application to Ideal-SVP
- How to meet ternary LWE keys
- A trace map attack against special ring-LWE samples
- Subtractive sets over cyclotomic rings. Limits of Schnorr-like arguments over lattices
- Advances in Cryptology - EUROCRYPT 2004
- Cryptographic Hardware and Embedded Systems - CHES 2004
- A Lattice Attack on Homomorphic NTRU with Non-invertible Public Keys
- Title not available (Why is that?)
- Characterizing overstretched NTRU attacks
- CHIMERA: combining ring-LWE-based fully homomorphic encryption schemes
- STP-LWE: A variant of learning with error for a flexible encryption
- A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack
- Analysis of Error Terms of Signatures Based on Learning with Errors
- Title not available (Why is that?)
- How to find ternary LWE keys using locality sensitive hashing
- On the higher-bit version of approximate inhomogeneous short integer solution problem
- Towards quantum large-scale password guessing on real-world distributions
- Revisiting lower dimension lattice attacks on NTRU
- Efficiently processing complex-valued data in homomorphic encryption
- On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes
- Choosing Parameters for NTRUEncrypt
- An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero
- Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures
- Multi-key FHE from LWE, Revisited
- A non-commutative cryptosystem based on quaternion algebras
- High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers
- A Lattice Based Public Key Cryptosystem Using Polynomial Representations
- Optimizations for NTRU
- Finding Shortest Lattice Vectors in the Presence of Gaps
- Reduced Gröbner bases and Macaulay-Buchberger basis theorem over Noetherian rings
- On error distributions in ring-based LWE
- The Complexity of Public-Key Cryptography
- Provably Secure NTRU Instances over Prime Cyclotomic Rings
- Revisiting Lattice Attacks on Overstretched NTRU Parameters
- Title not available (Why is that?)
- Gröbner bases of ideals invariant under a commutative group
- Fault analysis of the NTRUSign digital signature scheme
- Identity-based aggregate signcryption in the standard model from multilinear maps
- Information Security and Privacy
- Symplectic Lattice Reduction and NTRU
- Covert authentication from lattices
- Computing Generator in Cyclotomic Integer Rings
- New transference theorems on lattices possessing \(n^\varepsilon\)-unique shortest vectors
- Analyzing Blockwise Lattice Algorithms Using Dynamical Systems
- Finding shortest lattice vectors faster using quantum search
- Sieving for Shortest Vectors in Lattices Using Angular Locality-Sensitive Hashing
- Lattice Reduction Algorithms: Theory and Practice
- On random nonsingular Hermite normal form
- A scalable post-quantum hash-based group signature
- Rigorous and Efficient Short Lattice Vectors Enumeration
- Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
- An Efficient and Parallel Gaussian Sampler for Lattices
- Title not available (Why is that?)
- A framework for cryptographic problems from linear algebra
- Generalized Compact Knapsacks Are Collision Resistant
- Learning a parallelepiped: Cryptanalysis of GGH and NTRU signatures
- STACS 2004
- BKZ 2.0: Better Lattice Security Estimates
- Homomorphic Encryption
- Homomorphic Encryption Standard
- Generalized compact knapsacks, cyclic lattices, and efficient one-way functions
- Title not available (Why is that?)
- Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems
- An algebraic attack on rank metric code-based cryptosystems
- SWIFFT: A Modest Proposal for FFT Hashing
- Lattice polly cracker cryptosystems
- A new post-quantum multivariate polynomial public key encapsulation algorithm
- An experimental comparison of some LLL-type lattice basis reduction algorithms
- Adapting Density Attacks to Low-Weight Knapsacks
- Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic
- Title not available (Why is that?)
- A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU
- Homomorphic AES evaluation using the modified LTV scheme
- On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
- Title not available (Why is that?)
This page was built for software: NTRU