Ntru: a Public Key Cryptosystem

@inproceedings{Hoffstein1999NtruAP,
  title={Ntru: a Public Key Cryptosystem},
  author={Jeff Hoffstein and Daniel Lieman and Jill Pipher and Joseph H. Silverman},
  year={1999}
}
0. Introduction 1. Description of NTRU 1.1. Notation 1.2. Key Creation 1.3. Encryption 1.4. Decryption 1.5. Why Decryption Works 1.6. Parameter choices notation and a norm estimate 1.7. Sample spaces 1.8. A Decryption Criterion 2. Attributes and Advantages of NTRU 2.1. Theoretical Operating Speci cations 2.2. Comparison With Other PKCS's 3. Security Considerations 3.1. Security Analysis 3.2. Brute force attacks 3.3. Meet-in-the-middle attacks 3.4. Multiple transmission attacks 3.5. Semantic… CONTINUE READING
Highly Cited
This paper has 28 citations. REVIEW CITATIONS

Citations

Publications citing this paper.

References

Publications referenced by this paper.
Showing 1-8 of 8 references

Cryptanalysis of NTRU, preprint, February 1999 (a portion of a Master's thesis)

  • A. May
  • 1999

preprint

  • A. May, New lattice attacks on NTRU
  • April
  • 1999

revisited

  • P. Nguyen, Lattice attacks on NTRU
  • preprint, March
  • 1999
2 Excerpts

Recent results on PKCS#1: RSA encryption standard

  • D. Bleichenbacher, B. Kaliski, J. Staddon
  • RSA Laboratories' Bulletin, Number 7, June 26,
  • 1998
1 Excerpt

MIT { Laboratory for Computer Science preprint

  • O. Goldreich, S. Goldwasser, S. Halevi, Public-key cryptosystems from lattice reduction problems
  • November
  • 1996

Hoerner, Attacking the Chor Rivest cryptosystem by improved lattice reduction

  • H.H.C.P. Schnorr
  • Proc. EUROCRYPT
  • 1995

Similar Papers

Loading similar papers…