Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
BKZ 2.0: Better lattice security estimates
The best lattice reduction algorithm known in practice for high dimension is Schnorr-
Euchner's BKZ: all security estimates of lattice cryptosystems are based on NTL's old …
Euchner's BKZ: all security estimates of lattice cryptosystems are based on NTL's old …
Compact ring-LWE cryptoprocessor
In this paper we propose an efficient and compact processor for a ring-LWE based
encryption scheme. We present three optimizations for the Number Theoretic Transform …
encryption scheme. We present three optimizations for the Number Theoretic Transform …
NTRU prime: Reducing attack surface at low cost
Several ideal-lattice-based cryptosystems have been broken by recent attacks that exploit
special structures of the rings used in those cryptosystems. The same structures are also …
special structures of the rings used in those cryptosystems. The same structures are also …
High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers
Over the last years lattice-based cryptography has received much attention due to versatile
average-case problems like Ring-LWE or Ring-SIS that appear to be intractable by quantum …
average-case problems like Ring-LWE or Ring-SIS that appear to be intractable by quantum …
[PDF][PDF] Algorithm specifications and supporting documentation
This document specifies a key encapsulation mechanism (KEM) based on Hoffstein, Pipher,
and Silverman's NTRU encryption scheme [19, 20]. The KEM is constructed using a generic …
and Silverman's NTRU encryption scheme [19, 20]. The KEM is constructed using a generic …
[PDF][PDF] NTRU Prime.
Introduced by Hoffstein–Pipher–Silverman in 1998. Security related to lattice problems; pre-
version cryptanalyzed with LLL by Coppersmith and Shamir. System parameters (p, q), p …
version cryptanalyzed with LLL by Coppersmith and Shamir. System parameters (p, q), p …
Choosing parameters for NTRUEncrypt
We describe a method for generating parameter sets, and calculating security estimates, for
NTRUEncrypt. Our security analyses consider lattice attacks, the hybrid attack, subfield …
NTRUEncrypt. Our security analyses consider lattice attacks, the hybrid attack, subfield …
Towards practical lattice-based public-key encryption on reconfigurable hardware
With this work we provide further evidence that lattice-based cryptography is a promising
and efficient alternative to secure embedded applications. So far it is known for solid security …
and efficient alternative to secure embedded applications. So far it is known for solid security …
High-speed key encapsulation from NTRU
This paper presents software demonstrating that the 20-year-old NTRU cryptosystem is
competitive with more recent lattice-based cryptosystems in terms of speed, key size, and …
competitive with more recent lattice-based cryptosystems in terms of speed, key size, and …
Analyzing blockwise lattice algorithms using dynamical systems
Strong lattice reduction is the key element for most attacks against lattice-based
cryptosystems. Between the strongest but impractical HKZ reduction and the weak but fast …
cryptosystems. Between the strongest but impractical HKZ reduction and the weak but fast …