Pages that link to "Item:Q3593101"
From MaRDI portal
The following pages link to Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures (Q3593101):
Displaying 24 items.
- SoK: how (not) to design and implement post-quantum cryptography (Q826276) (← links)
- Gaussian sampling of lattices for cryptographic applications (Q893724) (← links)
- Learning a parallelepiped: Cryptanalysis of GGH and NTRU signatures (Q1015359) (← links)
- Public key compression for constrained linear signature schemes (Q1726681) (← links)
- Fault analysis of the NTRUSign digital signature scheme (Q1947651) (← links)
- Vulnerable public keys in NTRU cryptosystem (Q1997177) (← links)
- Key recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU lattices (Q2055645) (← links)
- On removing rejection conditions in practical lattice-based signatures (Q2118558) (← links)
- Integral matrix Gram root and lattice Gaussian sampling without floats (Q2119026) (← links)
- Symplectic Lattice Reduction and NTRU (Q3593099) (← links)
- A Digital Signature Scheme Based on CVP ∞ (Q5445459) (← links)
- Provably Secure NTRU Instances over Prime Cyclotomic Rings (Q5738796) (← links)
- Learning strikes again: the case of the DRS signature scheme (Q5915906) (← links)
- Learning strikes again: the case of the DRS signature scheme (Q5918281) (← links)
- Improved power analysis attacks on Falcon (Q6061534) (← links)
- Shorter hash-and-sign lattice-based signatures (Q6104336) (← links)
- Lattice-based cryptography: a survey (Q6183909) (← links)
- Public-key cryptosystems and signature schemes from \(p\)-adic lattices (Q6543365) (← links)
- \textsc{Antrag}: annular NTRU trapdoor generation. Making \textsc{Mitaka} as secure as FALCON (Q6595914) (← links)
- Exploiting the symmetry of \(\mathbb{Z}^n\): randomization and the automorphism problem (Q6604873) (← links)
- Profiling side-channel attacks on Dilithium. A small bit-fiddling leak breaks it all (Q6619833) (← links)
- Cryptanalysis of the \textsc{Peregrine} lattice-based signature scheme (Q6635758) (← links)
- Towards compact identity-based encryption on ideal lattices (Q6636118) (← links)
- FuLeakage: breaking FuLeeca by learning attacks (Q6652988) (← links)