|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1 occurrences of 1 keywords
|
|
|
Results
Found 38 publication records. Showing 38 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
80 | Daewan Han, Myung-Hwan Kim, Yongjin Yeom |
Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 107-117, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Paeng-Jung-Ha cryptosystem, GGH, NTRUEncrypt, Lattice attack |
75 | Joseph H. Silverman, William Whyte |
Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings, pp. 208-224, 2007, Springer, 3-540-69327-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
70 | Nicolas Gama, Phong Q. Nguyen |
New Chosen-Ciphertext Attacks on NTRU. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 89-106, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
70 | Nick Howgrave-Graham |
A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 150-169, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Philip S. Hirschhorn, Jeffrey Hoffstein, Nick Howgrave-Graham, William Whyte |
Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, pp. 437-455, 2009, 978-3-642-01956-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
52 | Mats Näslund, Igor E. Shparlinski, William Whyte |
On the Bit Security of NTRUEncrypt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, pp. 62-70, 2003, Springer, 3-540-00324-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
47 | Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar |
Public Key Cryptography in Sensor Networks - Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers, pp. 2-18, 2004, Springer, 3-540-24396-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Petros Mol, Moti Yung |
Recovering NTRU Secret Key from Inversion Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings, pp. 18-36, 2008, Springer, 978-3-540-78439-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
NTRUEncrypt, Inversion Oracles, Universal Breaking, Public-Key Cryptanalysis |
28 | Lin You, Yan Wang, Liang Li, Gengran Hu |
Secure Two-party Computation Approach for NTRUEncrypt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 386, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
28 | Taehyun Kim, Mun-Kyu Lee |
Efficient and Secure Implementation of NTRUEncrypt Using Signed Sliding Window Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 126591-126605, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Farnoud Farahmand, Malik Umar Sharif, Kevin Briggs, Kris Gaj |
A High-Speed Constant-Time Hardware Implementation of NTRUEncrypt SVES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 322, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
28 | Thomas Schamberger, Oliver Mischke, Johanna Sepúlveda |
Practical Evaluation of Masking for NTRUEncrypt on ARM Cortex-M4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COSADE ![In: Constructive Side-Channel Analysis and Secure Design - 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3-5, 2019, Proceedings, pp. 253-269, 2019, Springer, 978-3-030-16349-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Farnoud Farahmand, Duc Tri Nguyen, Viet Ba Dang, Ahmed Ferozpuri, Kris Gaj |
Software/Hardware Codesign of the Post Quantum Cryptography Algorithm NTRUEncrypt Using High-Level Synthesis and Register-Transfer Level Design Methodologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: 29th International Conference on Field Programmable Logic and Applications, FPL 2019, Barcelona, Spain, September 8-12, 2019, pp. 225-231, 2019, IEEE, 978-1-7281-4884-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Bo Mi, Darong Huang, Shaohua Wan 0001, Libo Mi, Jianqiu Cao |
Oblivious Transfer Based on NTRUEncrypt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 6, pp. 35283-35291, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Wei Dai 0007, William Whyte, Zhenfei Zhang |
Optimizing Polynomial Convolution for NTRUEncrypt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 67(11), pp. 1572-1583, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Wei Dai 0007, William Whyte, Zhenfei Zhang |
Optimizing polynomial convolution for NTRUEncrypt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 229, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
28 | Yang Wang 0050, Mingqiang Wang |
Provably Secure NTRUEncrypt over Any Cyclotomic Field. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Selected Areas in Cryptography - SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers, pp. 391-417, 2018, Springer, 978-3-030-10969-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Farnoud Farahmand, Malik Umar Sharif, Kevin Briggs, Kris Gaj |
A High-Speed Constant-Time Hardware Implementation of NTRUEncrypt SVES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPT ![In: International Conference on Field-Programmable Technology, FPT 2018, Naha, Okinawa, Japan, December 10-14, 2018, pp. 190-197, 2018, IEEE, 978-1-7281-0214-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Thomas Schamberger |
Post-quantum security: Power Analysis of NTRUEncrypt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Krypto-Tag ![In: 28. Krypto-Tag, Kirchheim bei München, Germany, June 7-8, 2018, 2018, Gesellschaft für Informatik e.V. / FG KRYPTO. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Yang Yu, Guangwu Xu, Xiaoyun Wang 0001 |
Provably Secure NTRUEncrypt over More General Cyclotomic Rings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 304, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
28 | Yang Wang 0050, Mingqiang Wang |
Efficient provable-secure NTRUEncrypt over any cyclotomic field. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 1104, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
28 | Moustafa Mahmoud, Mouna Nakkar, Amr M. Youssef |
A power analysis resistant FPGA implementation of NTRUEncrypt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICM ![In: 29th International Conference on Microelectronics, ICM 2017, Beirut, Lebanon, December 10-13, 2017, pp. 1-4, 2017, IEEE, 978-1-5386-4049-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Johanna Sepúlveda, Andreas Zankl, Oliver Mischke |
Cache attacks and countermeasures for NTRUEncrypt on MPSoCs: Post-quantum resistance for the IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SoCC ![In: 30th IEEE International System-on-Chip Conference, SOCC 2017, Munich, Germany, September 5-8, 2017, pp. 120-125, 2017, IEEE, 978-1-5386-4034-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang |
Choosing Parameters for NTRUEncrypt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2017 - The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings, pp. 3-18, 2017, Springer, 978-3-319-52152-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Bo Mi, Dongyan Liu |
Topology-Hiding Broadcast Based on NTRUEncrypt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 10(1), pp. 431-443, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Bingxin Liu, Huapeng Wu |
Efficient multiplication architecture over truncated polynomial ring for NTRUEncrypt system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: IEEE International Symposium on Circuits and Systems, ISCAS 2016, Montréal, QC, Canada, May 22-25, 2016, pp. 1174-1177, 2016, IEEE, 978-1-4799-5341-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang |
Choosing Parameters for NTRUEncrypt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 708, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
28 | Bingxin Liu, Huapeng Wu |
Efficient architecture and implementation for NTRUEncrypt system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MWSCAS ![In: IEEE 58th International Midwest Symposium on Circuits and Systems, MWSCAS 2015, Fort Collins, CO, USA, August 2-5, 2015, pp. 1-4, 2015, IEEE, 978-1-4673-6558-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Abdel Alim Kamal, Amr M. Youssef |
Strengthening hardware implementations of NTRUEncrypt against fault analysis attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptogr. Eng. ![In: J. Cryptogr. Eng. 3(4), pp. 227-240, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Damien Stehlé, Ron Steinfeld |
Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 4, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
28 | Abdel Alim Kamal, Amr M. Youssef |
A Scan-Based Side Channel Attack on the NTRUEncrypt Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Seventh International Conference on Availability, Reliability and Security, Prague, ARES 2012, Czech Republic, August 20-24, 2012, pp. 402-409, 2012, IEEE Computer Society, 978-1-4673-2244-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Ron Steinfeld, San Ling, Josef Pieprzyk, Christophe Tartary, Huaxiong Wang |
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, pp. 353-371, 2012, Springer, 978-3-642-30056-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
28 | |
NTRUEncrypt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 861, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Abdel Alim Kamal, Amr M. Youssef |
Fault Analysis of the NTRUEncrypt Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(4), pp. 1156-1158, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Jeffrey Hoffstein, Nick Howgrave-Graham, Jill Pipher, William Whyte |
Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The LLL Algorithm ![In: The LLL Algorithm - Survey and Applications, pp. 349-390, 2010, Springer, 978-3-642-02294-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Tommi Meskanen, Ari Renvall |
A wrap error attack against NTRUEncrypt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Discret. Appl. Math. ![In: Discret. Appl. Math. 154(2), pp. 382-391, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Nick Howgrave-Graham, Joseph H. Silverman, William Whyte |
Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 45, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
23 | Nick Howgrave-Graham, Joseph H. Silverman, William Whyte |
Choosing Parameter Sets forwithand. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, pp. 118-135, 2005, Springer, 3-540-24399-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #38 of 38 (100 per page; Change: )
|
|