M. Blum, S. Goldwasser, An efficient probabilistic public-key encryption scheme which hides all partial information, Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science, vol. 196, Springer-Verlag, 1985, pp. 289–299.
Google Scholar
D. Coppersmith, A. Shamir, Lattice attacks on NTRU, Preprint, April 5, 1997; presented at Eurocrypt 97.
Google Scholar
W. Diffie, M.E. Hellman, New directions in cryptography, IEEE Trans. on Information Theory 22 (1976), 644–654.
MATH
MathSciNet
CrossRef
Google Scholar
O. Goldreich, S. Goldwasser, S. Halevi, Public-key cryptosystems from lattice reduction problems, MIT — Laboratory for Computer Science preprint, November 1996.
Google Scholar
S. Goldwasser and A. Micali, Probabilistic encryption, J. Computer and Systems Science 28 (1984), 270–299.
MATH
MathSciNet
CrossRef
Google Scholar
J. Hoffstein, J. Pipher, J.H. Silverman, NTRU: A new high speed public key cryptosystem, Preprint; presented at the rump session of Crypto 96.
Google Scholar
A.K. Lenstra, H.W. Lenstra, L. LovŚz, Factoring polynomials with polynomial coefficients, Math. Annalen 261 (1982), 515–534.
MATH
CrossRef
Google Scholar
R.J. McEliece, A public-key cryptosystem based on algebraic coding theory, JPL Pasadena, DSN Progress Reports 42–44 (1978), 114–116.
Google Scholar
R.L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public key cryptosystems, Communications of the ACM 21 (1978), 120–126.
MATH
MathSciNet
CrossRef
Google Scholar
C.P. Schnorr, Block reduced lattice bases and successive minima, Combinatorics, Probability and Computing 3 (1994), 507–522.
MATH
MathSciNet
CrossRef
Google Scholar
C.P. Schnorr, M. Euchner, Lattice basis reduction: improved practical algorithms and solving subset sum problems, Mathematical Programing 66 (1994), 181–199.
MATH
MathSciNet
CrossRef
Google Scholar
C.P. Schnorr, H.H. Hoerner, Attacking the Chor Rivest cryptosystem by improved lattice reduction, Proc. EUROCRYPT 1995, Lecture Notes in Computer Science 921, Springer-Verlag, 1995, pp. 1–12.
Google Scholar
J.H. Silverman, A Meet-In-The-Middle Attack on an NTRU Private Key, preprint.
Google Scholar