<--- Back to Details
First PageDocument Content
Elliptic curves / Public-key cryptography / Elliptic curve cryptography / NTRU / Elliptic Curve DSA / Lattice problem / Counting points on elliptic curves / Hyperelliptic curve cryptography / Elliptic curve / Cryptography / Post-quantum cryptography / Finite fields
Date: 2008-03-20 11:42:48
Elliptic curves
Public-key cryptography
Elliptic curve cryptography
NTRU
Elliptic Curve DSA
Lattice problem
Counting points on elliptic curves
Hyperelliptic curve cryptography
Elliptic curve
Cryptography
Post-quantum cryptography
Finite fields

References [1] M. Agrawal, N. Kayal, and N. Saxena. PRIMES is in P. Ann. of Math. (2), 160(2):781–793, [removed]L. V. Ahlfors. Complex Analysis. McGraw-Hill Book Co., New York, third edition, 1978. An introduction to

Add to Reading List

Source URL: www.math.brown.edu

Download Document from Source Website

File Size: 94,35 KB

Share Document on Facebook

Similar Documents

Characterizing overstretched NTRU attacks Gabrielle De Micheli, Nadia Heninger and Barak Shani University of Pennsylvania Abstract Overstretched NTRU, an NTRU variant with a large modulus, has been used as a building

Characterizing overstretched NTRU attacks Gabrielle De Micheli, Nadia Heninger and Barak Shani University of Pennsylvania Abstract Overstretched NTRU, an NTRU variant with a large modulus, has been used as a building

DocID: 1xTAG - View Document

NTRU Prime: reducing attack surface at low cost Daniel J. Bernstein1 , Chitchanok Chuengsatiansup2 , Tanja Lange3 , and Christine van Vredendaal3 1

NTRU Prime: reducing attack surface at low cost Daniel J. Bernstein1 , Chitchanok Chuengsatiansup2 , Tanja Lange3 , and Christine van Vredendaal3 1

DocID: 1viGI - View Document

NTRU Prime Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, and Christine van Vredendaal Technische Universiteit Eindhoven  25 August 2016

NTRU Prime Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, and Christine van Vredendaal Technische Universiteit Eindhoven 25 August 2016

DocID: 1vfuq - View Document

A Scalable Implementation of Fully Homomorphic Encryption Built on NTRU∗ Kurt Rohloff David Bruce Cousins Raytheon BBN Technologies 10 Moulton St.

A Scalable Implementation of Fully Homomorphic Encryption Built on NTRU∗ Kurt Rohloff David Bruce Cousins Raytheon BBN Technologies 10 Moulton St.

DocID: 1u1LL - View Document

A subfield lattice attack on overstretched NTRU assumptions Cryptanalysis of some FHE and Graded Encoding Schemes Martin Albrecht1? , Shi Bai2?? , and L´eo Ducas3? ? ? 1

A subfield lattice attack on overstretched NTRU assumptions Cryptanalysis of some FHE and Graded Encoding Schemes Martin Albrecht1? , Shi Bai2?? , and L´eo Ducas3? ? ? 1

DocID: 1t0yC - View Document