Low-cost implementations of NTRU for pervasive security, 19th IEEE International Conference on Application-Specific Systems, Architectures and Processors, pp.79-84, 2008. ,
, NTRU in Constrained Devices, pp.262-272, 2001.
NTRU in constrained devices, Cryptographic Hardware and Embedded Systems -CHES 2001, Third International Workshop, pp.262-272, 2001. ,
Secure and compact full ntru hardware implementation, 2018 IFIP/IEEE International Conference on Very Large Scale Integration, pp.89-94, 2018. ,
Master's thesis, Worcester Polytechnic Institute, 2002. ,
Towards post-quantum security for IoT endpoints with NTRU, Design, Automation Test in Europe Conference Exhibition, pp.698-703, 2017. ,
Choosing parameters for NTRUEncrypt, vol.708, 2015. ,
The impact of decryption failures on the security of NTRU encryption, Annual International Cryptology Conference, pp.226-246, 2003. ,
NAEP: Provable security in the presence of decryption failures. IACR Cryptology ePrint Archive, vol.172, 2003. ,
Ntrubased sensor network security: a low-power hardware implementation perspective, Security and Communication Networks, vol.2, issue.1, pp.71-81, 2009. ,
, Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices, IEEE Std 1363.1-2008 pp, pp.1-69, 2009.
Modulus without division, a tutorial, 2001. ,
An FPGA implementation of the NTRUEncrypt cryptosystem, Microelectronics (ICM), 2009 International Conference on, pp.209-212, 2009. ,
Sliding window method for NTRU, ACNS, pp.432-442, 2007. ,
Efficient architecture and implementation for NTRUEncrypt system, IEEE 58th International Midwest Symposium on, pp.1-4, 2015. ,
Efficient multiplication architecture over truncated polynomial ring for NTRUEncrypt system, IEEE International Symposium on Circuits and Systems, pp.1174-1177, 2016. ,
A fast quantum mechanical algorithm for database search, 28th Annual ACM Symposium on the Theory of Computing, p.212, 1996. ,
, NTRU Software Implementation for Constrained Devices. Master's thesis, 2008.
, Announcing request for nominations for public-key post-quantum cryptographic algorithms, 2016.
, SHA-256 Core, 2013.
Cache attacks and countermeasures for ntruencrypt on mpsocs: Post-quantum resistance for the iot, 30th IEEE International System-on-Chip Conference (SOCC), pp.120-125, 2017. ,
Post-quantum enabled cyber physical systems, IEEE Embedded Systems Letters. pp, pp.1-4, 2019. ,
Algorithms for quantum computation: Discrete logarithms and factoring, Proceedings., 35th Annual Symposium on, pp.124-134, 1994. ,
, , 2017.
Efficient Implementations of NTRU in Wireless Network, Communications and Network, vol.5, issue.03, p.485, 2013. ,