Finding small roots of univariate modular equations revisited N Howgrave-Graham Crytography and Coding, 131-142, 1997 | 451 | 1997 |
NTRUSIGN: Digital signatures using the NTRU lattice J Hoffstein, N Howgrave-Graham, J Pipher, JH Silverman, W Whyte Cryptographers’ track at the RSA conference, 122-140, 2003 | 413 | 2003 |
Approximate integer common divisors N Howgrave-Graham International cryptography and lattices conference, 51-66, 2001 | 321 | 2001 |
Lattice attacks on digital signature schemes NA Howgrave-Graham, NP Smart Designs, Codes and Cryptography 23, 283-290, 2001 | 313 | 2001 |
A hybrid lattice-reduction and meet-in-the-middle attack against NTRU N Howgrave-Graham Advances in Cryptology-CRYPTO 2007: 27th Annual International Cryptology …, 2007 | 303 | 2007 |
The impact of decryption failures on the security of NTRU encryption N Howgrave-Graham, PQ Nguyen, D Pointcheval, J Proos, JH Silverman, ... Annual International Cryptology Conference, 226-246, 2003 | 193 | 2003 |
New generic algorithms for hard knapsacks N Howgrave-Graham, A Joux Annual International Conference on the Theory and Applications of …, 2010 | 190 | 2010 |
Factoring N = prq for Large r D Boneh, G Durfee, N Howgrave-Graham Annual International Cryptology Conference, 326-337, 1999 | 189 | 1999 |
Paillier's cryptosystem revisited D Catalano, R Gennaro, N Howgrave-Graham, PQ Nguyen Proceedings of the 8th ACM Conference on Computer and Communications …, 2001 | 162 | 2001 |
Choosing NTRUEncrypt parameters in light of combined lattice reduction and MITM approaches PS Hirschhorn, J Hoffstein, N Howgrave-Graham, W Whyte Applied Cryptography and Network Security: 7th International Conference …, 2009 | 128 | 2009 |
Choosing parameter sets for NTRUEncrypt with NAEP and SVES-3 N Howgrave-Graham, JH Silverman, W Whyte Cryptographers’ Track at the RSA Conference, 118-135, 2005 | 118 | 2005 |
A Meet-in-the-Middle Attack on an NTRU Private key N Howgrave-Graham, JH Silverman, W Whyte Technical report, NTRU Cryptosystems, June 2003. Report, 2003 | 115 | 2003 |
Practical lattice-based cryptography: NTRUEncrypt and NTRUSign J Hoffstein, N Howgrave-Graham, J Pipher, W Whyte The LLL Algorithm: Survey and Applications, 349-390, 2009 | 109 | 2009 |
Effective LLL reduction for lattice decoding C Ling, N Howgrave-Graham 2007 IEEE international symposium on information theory, 196-200, 2007 | 98 | 2007 |
Rankin’s constant and blockwise lattice reduction N Gama, N Howgrave-Graham, H Koy, PQ Nguyen Advances in Cryptology-CRYPTO 2006: 26th Annual International Cryptology …, 2006 | 98 | 2006 |
The modular inversion hidden number problem D Boneh, S Halevi, N Howgrave-Graham Advances in Cryptology—ASIACRYPT 2001: 7th International Conference on the …, 2001 | 80 | 2001 |
NAEP: Provable security in the presence of decryption failures N Howgrave-Graham, JH Silverman, A Singer, W Whyte Cryptology ePrint Archive, 2003 | 79 | 2003 |
The bit security of Paillier’s encryption scheme and its applications D Catalano, R Gennaro, N Howgrave-Graham Advances in Cryptology—EUROCRYPT 2001: International Conference on the …, 2001 | 73 | 2001 |
Symplectic lattice reduction and NTRU N Gama, N Howgrave-Graham, PQ Nguyen Annual International Conference on the Theory and Applications of …, 2006 | 69 | 2006 |
Reduced and fixed-complexity variants of the LLL algorithm for communications C Ling, WH Mow, N Howgrave-Graham IEEE Transactions on Communications 61 (3), 1040-1050, 2013 | 63 | 2013 |