Low-cost implementations of NTRU for pervasive security, 19th IEEE International Conference on Application-Specific Systems, Architectures and Processors, pp.79-84, 2008. ,

, NTRU in Constrained Devices, pp.262-272, 2001.

NTRU in constrained devices, Cryptographic Hardware and Embedded Systems -CHES 2001, Third International Workshop, pp.262-272, 2001. ,

Secure and compact full ntru hardware implementation, 2018 IFIP/IEEE International Conference on Very Large Scale Integration, pp.89-94, 2018. ,

Master's thesis, Worcester Polytechnic Institute, 2002. ,

Towards post-quantum security for IoT endpoints with NTRU, Design, Automation Test in Europe Conference Exhibition, pp.698-703, 2017. ,

Choosing parameters for NTRUEncrypt, vol.708, 2015. ,

The impact of decryption failures on the security of NTRU encryption, Annual International Cryptology Conference, pp.226-246, 2003. ,

NAEP: Provable security in the presence of decryption failures. IACR Cryptology ePrint Archive, vol.172, 2003. ,

Ntrubased sensor network security: a low-power hardware implementation perspective, Security and Communication Networks, vol.2, issue.1, pp.71-81, 2009. ,

, Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices, IEEE Std 1363.1-2008 pp, pp.1-69, 2009.

Modulus without division, a tutorial, 2001. ,

An FPGA implementation of the NTRUEncrypt cryptosystem, Microelectronics (ICM), 2009 International Conference on, pp.209-212, 2009. ,

Sliding window method for NTRU, ACNS, pp.432-442, 2007. ,

Efficient architecture and implementation for NTRUEncrypt system, IEEE 58th International Midwest Symposium on, pp.1-4, 2015. ,

Efficient multiplication architecture over truncated polynomial ring for NTRUEncrypt system, IEEE International Symposium on Circuits and Systems, pp.1174-1177, 2016. ,

A fast quantum mechanical algorithm for database search, 28th Annual ACM Symposium on the Theory of Computing, p.212, 1996. ,

, NTRU Software Implementation for Constrained Devices. Master's thesis, 2008.

, Announcing request for nominations for public-key post-quantum cryptographic algorithms, 2016.

, SHA-256 Core, 2013.

Cache attacks and countermeasures for ntruencrypt on mpsocs: Post-quantum resistance for the iot, 30th IEEE International System-on-Chip Conference (SOCC), pp.120-125, 2017. ,

Post-quantum enabled cyber physical systems, IEEE Embedded Systems Letters. pp, pp.1-4, 2019. ,

Algorithms for quantum computation: Discrete logarithms and factoring, Proceedings., 35th Annual Symposium on, pp.124-134, 1994. ,

, , 2017.

Efficient Implementations of NTRU in Wireless Network, Communications and Network, vol.5, issue.03, p.485, 2013. ,