NTRUSIGN: Digital Signatures Using the NTRU Lattice
暂无分享,去创建一个
William Whyte | Nick Howgrave-Graham | Joseph H. Silverman | Jill Pipher | Jeffrey Hoffstein | Nick Howgrave-Graham | J. Hoffstein | J. Pipher | J. Silverman | William Whyte | Nick Howgrave-Graham | Joseph H. Silverman
[1] L. H. Hackstaff. Systems of formal logic , 1966 .
[2] A. Shamir. A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem , 1982, FOCS 1982.
[3] László Babai,et al. On Lovász’ lattice reduction and the nearest lattice point problem , 1986, Comb..
[4] John T. Kohl,et al. The Evolution of the Kerberos Authentication Service , 1992 .
[5] Henri Cohen,et al. A course in computational algebraic number theory , 1993, Graduate texts in mathematics.
[6] Oded Goldreich,et al. Public-Key Cryptosystems from Lattice Reduction Problems , 1996, CRYPTO.
[7] O. Goldreich. Public-key cryptography from lattice reduction problems , 1997, CRYPTO 1997.
[8] Cynthia Dwork,et al. A public-key cryptosystem with worst-case/average-case equivalence , 1997, STOC '97.
[9] Joseph H. Silverman,et al. NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.
[10] Phong Q. Nguyen. Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97 , 1999, CRYPTO.
[11] Tatsuaki Okamoto,et al. Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, CRYPTO.
[12] Alfred Menezes,et al. Software Implementation of Elliptic Curve Cryptography over Binary Fields , 2000, CHES.
[13] Jacques Stern,et al. Lattice Reduction in Cryptology: An Update , 2000, ANTS.
[14] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.
[15] Joseph H. Silverman,et al. Polynomial Rings and Efficient Public Key Authentication II , 2001 .
[16] Joseph H. Silverman,et al. Dimension Reduction Methods for Convolution Modular Lattices , 2001, CaLC.
[17] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[18] Craig Gentry,et al. Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001 , 2001, ASIACRYPT.
[19] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[20] Craig Gentry,et al. Cryptanalysis of the Revised NTRU Signature Scheme , 2002, EUROCRYPT.
[21] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings , 2006, CHES.
[22] Liqun Chen,et al. Applications of Multiple Trust Authorities in Pairing Based Cryptosystems , 2002, InfraSec.
[23] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.