![[ICO]](/icons/blank.gif) | Name | Last modified | Size | Description |
|
![[PARENTDIR]](/icons/back.gif) | Parent Directory | | - | |
![[ ]](/icons/layout.gif) | NTRU Prime (2016) - Bernstein, Chuengsatiansup, Lange, Vredendaal.pdf | 2023-08-25 22:24 | 446K | |
![[ ]](/icons/layout.gif) | NTRU: A Ring-Based Public Key Cryptosystem (1996) - Hoffstein, Pipher, Silverman.pdf | 2023-08-25 22:24 | 274K | |
![[ ]](/icons/layout.gif) | NTRU-KE: A Lattice-based Public Key Exchange Protocol (2013) - Lei, Liao.pdf | 2023-08-25 22:24 | 161K | |
![[ ]](/icons/layout.gif) | Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures (2012) - Ducas, Nguyen.pdf | 2023-08-25 22:24 | 392K | |
![[ ]](/icons/layout.gif) | Hybrid Lattice Reduction and Meet in the Middle Resistant Parameter selection for NTRUEncrypt (2007) - Hoffstein et. al.pdf | 2023-08-25 22:24 | 167K | |
![[ ]](/icons/layout.gif) | Efficient Embedded Security Standards (EESS) #1: Implementation Aspects of NTRUEncrypt and NTRUSign (2003).pdf | 2023-08-25 22:24 | 315K | |
![[ ]](/icons/layout.gif) | Comparison Between Subfield and Straightforward Attacks on NTRU (2016) - Kirchner, Fouque.pdf | 2023-08-25 22:24 | 249K | |
![[ ]](/icons/layout.gif) | An Introduction to Elliptic and Hyperelliptic Curve Cryptography and the NTRU Cryptosystem (2003) - Scholten Vercauteren.pdf | 2023-08-25 22:24 | 249K | |
|