ACM:
Comparison of innovative signature algorithms for WSNs.pdf (221.9 KB)
Gröbner bases for public key cryptography.pdf (254.5 KB)
IEL:
Achieving NTRU with Montgomery multiplication.pdf (669.8 KB)
Efficient Traitor Tracing Scheme Based On NTRU.pdf (203.0 KB)
Hybrid Lattice-Reduction and Meet-In-The-Middle Resistant Parameter selection for NTRUEncrypt.pdf (166.9 KB)
Lattice-based homomorphic encryption of vector spaces.pdf (240.2 KB)
Logical Mistakes in NTRU Compensation Algorithm and Improvement of Encryption Verification Algor.pdf (587.2 KB)
Low-cost implementations of NTRU for pervasive security.pdf (422.4 KB)
Research on PKI Model Based on NTRU.pdf (254.6 KB)
Study on NTRU decryption failures.pdf (119.8 KB)
SDOS:
A wrap error attack against NTRUEncrypt.pdf (518.1 KB)
Distribution of inverses in polynomial rings.pdf (590.0 KB)
Random small Hamming weight products with applications to cryptography.pdf (163.3 KB)
Testing set proportionality and the Ádám isomorphism of circulant graphs.pdf (150.4 KB)
Springer:
A Chosen-Ciphertext Attack against NTRU.pdf (201.7 KB)
A hybrid lattice-reduction and meet-in-the-middle attack against ntru.pdf (581.8 KB)
A Key Encapsulation Mechanism for NTRU.pdf (265.0 KB)
A Variant of NTRU with Non-invertible Polynomials.pdf (154.6 KB)
An Algebraic Approach to NTRU ( q = 2 n) via Witt Vectors and Overdetermined Systems of Nonlinea.pdf (204.5 KB)
Analysis and Improvements of NTRU Encryption Paddings.pdf (251.1 KB)
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001.pdf (711.2 KB)
Cryptanalysis of the Revised NTRU Signature Scheme.pdf (282.1 KB)
Key Recovery and Message Attacks on NTRU-Composite.pdf (194.4 KB)
Key Recovery Attacks on NTRU without Ciphertext Validation Routine.pdf (167.6 KB)
Lattic Attack on NTRU.pdf (350.4 KB)
Lattice Attacks on NTRU.pdf (493.4 KB)
MaTRU- A New NTRU-Based Cryptosystem.pdf (444.8 KB)
New chosen-ciphertext attacks on ntru.pdf (551.0 KB)
NSS- An NTRU Lattice-Based Signature Scheme.pdf (243.3 KB)
NTRU- A Ring-Based Public Key Cryptosystem.pdf (220.8 KB)
NTRU in Constrained Devices.pdf (149.2 KB)
NTRUSign- Digital Signatures Using the NTRU Lattice.pdf (359.0 KB)
On the Bit Security of NTRUEncrypt.pdf (155.7 KB)
Recovering NTRU Secret Key from Inversion Oracles.pdf (569.4 KB)
Others:
Almost Inverses and Fast Ntru Key Creation.pdf (97.0 KB)
Chosen-Ciphertext Attacks on Optimized NTRU.pdf (151.5 KB)
Efficient NTRU Implementations.pdf (390.6 KB)
Cryptanalysis of NTRU.pdf (207.0 KB)
Optimizations for NTRU.pdf (162.3 KB)
Protecting NTRU Against Chosen Ciphertext andReaction Attacks.pdf (63.9 KB)
Reaction Attacks Against the NTRU Public Key Cryptosystem.pdf (85.5 KB)
A_Hybrid_Lattice-Reduction_and_Meet-in-the-Middle_Attack_Against_NTRU.rar (798.0 KB)