Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

NTRUEncrypt

The NTRUEncrypt public key cryptosystem, also known as the NTRU encryption algorithm, is a lattice-based alternative to RSA and ECC and is based on… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
This paper studies ways to backdoor lattice-based systems following Young and Yung’s work on backdooring RSA and discrete-log… Expand
  • table 5.1
  • figure 5.1
  • figure 5.2
  • figure 5.3
  • figure 5.4
Is this relevant?
Highly Cited
2015
Highly Cited
2015
We describe a method for generating parameter sets, and calculating security estimates, for NTRUEncrypt. Our security analyses… Expand
  • table 1
  • figure 1
  • table 2
  • table 3
  • table 4
Is this relevant?
2015
2015
The use of alternative foundations for constructing more secure and efficient cryptographic schemes is a topic worth exploring… Expand
  • table 1
  • table 2
  • table 4
  • table 3
  • figure 1
Is this relevant?
2015
2015
NTRU has gained much attention recently because it is relatively efficient for practical implementation among the post-quantum… Expand
  • figure 1
  • table I
  • figure 3
  • figure 2
  • figure 4
Is this relevant?
2014
2014
Since its introduction more than a decade ago the homomorphic properties of the NTRU encryption scheme have gone largely ignored… Expand
  • table 1
  • table 2
  • figure 1
  • table 3
  • table 4
Is this relevant?
2011
2011
  • A. Kamal, A. Youssef
  • IEICE Trans. Fundam. Electron. Commun. Comput…
  • 2011
  • Corpus ID: 39621320
In this paper, we present a fault analysis of the original NTRU public key cryptosystem. The fault model in which we analyze the… Expand
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We present the new NTRUEncrypt parameter generation algorithm, which is designed to be secure in light of recent attacks that… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
2006
2006
We present a chosen plaintext attack on the NTRU encryption system. We assume that the attacker can detect wrap errors, that the… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We present, for the first time, an algorithm to choose parameter sets for NTRUEncrypt that give a desired level of security. 
  • table 1
  • table 2
  • table 4
  • table 5
Is this relevant?
2003
2003
  • J. Proos
  • IACR Cryptol. ePrint Arch.
  • 2003
  • Corpus ID: 8399696
A property of the NTRU public-key cryptosystem is that it does not provide perfect decryption. That is, given an instance of the… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?