Skip to search formSkip to main content

You are currently offline. Some features of the site may not work correctly.

Semantic Scholar uses AI to extract papers important to this topic.

2017

2017

This paper studies ways to backdoor lattice-based systems following Young and Yung’s work on backdooring RSA and discrete-log… Expand

Is this relevant?

Highly Cited

2015

Highly Cited

2015

We describe a method for generating parameter sets, and calculating security estimates, for NTRUEncrypt. Our security analyses… Expand

Is this relevant?

2015

2015

The use of alternative foundations for constructing more secure and efficient cryptographic schemes is a topic worth exploring… Expand

Is this relevant?

2015

2015

NTRU has gained much attention recently because it is relatively efficient for practical implementation among the post-quantum… Expand

Is this relevant?

2014

2014

Since its introduction more than a decade ago the homomorphic properties of the NTRU encryption scheme have gone largely ignored… Expand

Is this relevant?

2011

2011

In this paper, we present a fault analysis of the original NTRU public key cryptosystem. The fault model in which we analyze the… Expand

Is this relevant?

Highly Cited

2009

Highly Cited

2009

We present the new NTRUEncrypt parameter generation algorithm, which is designed to be secure in light of recent attacks that… Expand

Is this relevant?

2006

2006

We present a chosen plaintext attack on the NTRU encryption system. We assume that the attacker can detect wrap errors, that the… Expand

Is this relevant?

Highly Cited

2005

Highly Cited

2005

We present, for the first time, an algorithm to choose parameter sets for NTRUEncrypt that give a desired level of security.

Is this relevant?

2003

2003

A property of the NTRU public-key cryptosystem is that it does not provide perfect decryption. That is, given an instance of the… Expand

Is this relevant?