Characterizing overstretched NTRU attacks
暂无分享,去创建一个
[1] Joseph H. Silverman,et al. NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.
[2] Joseph H. Silverman,et al. Dimension Reduction Methods for Convolution Modular Lattices , 2001, CaLC.
[3] Pierre-Alain Fouque,et al. Revisiting Lattice Attacks on Overstretched NTRU Parameters , 2017, EUROCRYPT.
[4] W. Banks,et al. Distribution of inverses in polynomial rings , 2001 .
[5] William Whyte,et al. NTRUSIGN: Digital Signatures Using the NTRU Lattice , 2003, CT-RSA.
[6] C. P. Schnorr,et al. A Hierarchy of Polynomial Time Lattice Basis Reduction Algorithms , 1987, Theor. Comput. Sci..
[7] Ron Steinfeld,et al. NTRU Cryptosystem: Recent developments and emerging mathematical problems in finite polynomial rings , 2014 .
[8] Lauwerens Kuipers,et al. Uniform distribution of sequences , 1974 .
[9] Adi Shamir,et al. Lattice Attacks on NTRU , 1997, EUROCRYPT.
[10] Martin R. Albrecht,et al. A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes , 2016, CRYPTO.
[11] Gregory F. Lawler,et al. Random Walk: A Modern Introduction , 2010 .
[12] Pierre Samuel,et al. Algebraic theory of numbers , 1971 .
[13] Craig Gentry,et al. Cryptanalysis of the Revised NTRU Signature Scheme , 2002, EUROCRYPT.
[14] Craig Gentry,et al. Candidate Multilinear Maps from Ideal Lattices , 2013, EUROCRYPT.
[15] Vinod Vaikuntanathan,et al. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption , 2012, STOC '12.
[16] G. Pataki,et al. On sublattice determinants in reduced bases , 2008, 0804.4014.
[17] Ron Steinfeld,et al. Making NTRU as Secure as Worst-Case Problems over Ideal Lattices , 2011, EUROCRYPT.
[18] K. Conrad,et al. Finite Fields , 2018, Series and Products in the Development of Mathematics.
[19] Dan Boneh,et al. Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes , 1996, CRYPTO.
[20] Michael Naehrig,et al. Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme , 2013, IMACC.
[21] J. Cheon,et al. An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero , 2016, LMS J. Comput. Math..
[22] Tsuyoshi Takagi,et al. Choosing Parameters for the Subfield Lattice Attack Against Overstretched NTRU , 2017, ISC.