Academic literature on the topic 'NTRUSign'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'NTRUSign.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "NTRUSign"
Hu, Yupu, Baocang Wang, and Wencai He. "NTRUSign With a New Perturbation." IEEE Transactions on Information Theory 54, no. 7 (July 2008): 3216–21. http://dx.doi.org/10.1109/tit.2008.924662.
Full textKamal, Abdel Alim, and Amr M. Youssef. "Fault analysis of the NTRUSign digital signature scheme." Cryptography and Communications 4, no. 2 (January 6, 2012): 131–44. http://dx.doi.org/10.1007/s12095-011-0061-3.
Full textHASEGAWA, Shingo, Shuji ISOBE, Masahiro MAMBO, Hiroki SHIZUYA, Yuichi FUTA, and Motoji OHMORI. "A Countermeasure for Protecting NTRUSign against the Transcript Attack." Interdisciplinary Information Sciences 13, no. 2 (2007): 181–88. http://dx.doi.org/10.4036/iis.2007.181.
Full textYin, Aihan, and Yisheng Ding. "Design of a mutual authentication based on NTRUsign with a perturbation and inherent multipoint control protocol frames in an Ethernet-based passive optical network." Optical Engineering 53, no. 11 (November 6, 2014): 115101. http://dx.doi.org/10.1117/1.oe.53.11.115101.
Full textRamteke, Swati P. "ntrusion Detection of Masquerading Attacks & Secure Authentication in Cloud." IOSR Journal of Computer Engineering 9, no. 2 (2013): 28–31. http://dx.doi.org/10.9790/0661-0922831.
Full textLi, Daofeng, Haiqiang Chen, Cheng Zhong, Taoshen Li, and Feng Wang. "A New Self-Certified Signature Scheme Based on NTRUSing for Smart Mobile Communications." Wireless Personal Communications 96, no. 3 (June 3, 2017): 4263–78. http://dx.doi.org/10.1007/s11277-017-4385-y.
Full textYin, Aihan, Hongchao Liang, and Ming Zhu. "Authentication Protocol using MYK-NTRUSign Signature Algorithm in Wireless Network Environment." Journal of Networks 9, no. 5 (May 8, 2014). http://dx.doi.org/10.4304/jnw.9.5.1139-1144.
Full textDissertations / Theses on the topic "NTRUSign"
Черниш, Д. І., and О. А. Мельникова. "Використання алгоритмів приведення базису решітки при атаках на алгоритм ЕЦП FALCON." Thesis, НТУ «ХПІ», 2020. http://openarchive.nure.ua/handle/document/14286.
Full textAkrout, Rim. "Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web." Phd thesis, INSA de Toulouse, 2012. http://tel.archives-ouvertes.fr/tel-00782565.
Full textBook chapters on the topic "NTRUSign"
Min, SungJun, Go Yamamoto, and Kwangjo Kim. "Weak Property of Malleability in NTRUSign." In Information Security and Privacy, 379–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-27800-9_33.
Full textHoffstein, Jeff, Nick Howgrave-Graham, Jill Pipher, and William Whyte. "Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign." In The LLL Algorithm, 349–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02295-1_11.
Full textHoffstein, Jeffrey, Nick Howgrave-Graham, Jill Pipher, Joseph H. Silverman, and William Whyte. "NTRUSign: Digital Signatures Using the NTRU Lattice." In Topics in Cryptology — CT-RSA 2003, 122–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36563-x_9.
Full textDucas, Léo, and Phong Q. Nguyen. "Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures." In Advances in Cryptology – ASIACRYPT 2012, 433–50. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34961-4_27.
Full text"NTRUSign." In Encyclopedia of Cryptography and Security, 861. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_1162.
Full textConference papers on the topic "NTRUSign"
Wang, Xiang. "A New SDVS Based on NTRUSign." In 2010 International Conference on Communications and Mobile Computing (CMC). IEEE, 2010. http://dx.doi.org/10.1109/cmc.2010.258.
Full textZhang, Jianhong, and Cheng Ji. "An Id-Based and Repairing NTRUSign-Based Anoymous Multi-Proxy Signature Scheme." In 2009 International Conference on Computational Intelligence and Software Engineering. IEEE, 2009. http://dx.doi.org/10.1109/cise.2009.5366284.
Full text