default search action
BibTeX records: Jeffrey Hoffstein
@article{DBLP:journals/axioms/CambouPHH23, author = {Bertrand Cambou and Christopher Robert Philabaum and Jeffrey Hoffstein and Maurice Herlihy}, title = {Methods to Encrypt and Authenticate Digital Files in Distributed Networks and Zero-Trust Environments}, journal = {Axioms}, volume = {12}, number = {6}, pages = {531}, year = {2023}, url = {https://doi.org/10.3390/axioms12060531}, doi = {10.3390/AXIOMS12060531}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/axioms/CambouPHH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DasHPWZ20, author = {Dipayan Das and Jeffrey Hoffstein and Jill Pipher and William Whyte and Zhenfei Zhang}, title = {Modular lattice signatures, revisited}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {3}, pages = {505--532}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00694-x}, doi = {10.1007/S10623-019-00694-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DasHPWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/HoffsteinSWZ20, author = {Jeffrey Hoffstein and Joseph H. Silverman and William Whyte and Zhenfei Zhang}, title = {A signature scheme from the finite field isomorphism problem}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {39--54}, year = {2020}, url = {https://doi.org/10.1515/jmc-2015-0050}, doi = {10.1515/JMC-2015-0050}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/HoffsteinSWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DorozHSS20, author = {Yarkin Dor{\"{o}}z and Jeffrey Hoffstein and Joseph H. Silverman and Berk Sunar}, title = {{MMSAT:} {A} Scheme for Multimessage Multiuser Signature Aggregation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {520}, year = {2020}, url = {https://eprint.iacr.org/2020/520}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DorozHSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtCCDGGHH19, author = {Martin R. Albrecht and Melissa Chase and Hao Chen and Jintai Ding and Shafi Goldwasser and Sergey Gorbunov and Shai Halevi and Jeffrey Hoffstein and Kim Laine and Kristin E. Lauter and Satya Lokam and Daniele Micciancio and Dustin Moody and Travis Morrison and Amit Sahai and Vinod Vaikuntanathan}, title = {Homomorphic Encryption Standard}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {939}, year = {2019}, url = {https://eprint.iacr.org/2019/939}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtCCDGGHH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DasHPWZ19, author = {Dipayan Das and Jeffrey Hoffstein and Jill Pipher and William Whyte and Zhenfei Zhang}, title = {Modular lattice signatures, revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1301}, year = {2019}, url = {https://eprint.iacr.org/2019/1301}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DasHPWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DorozHPSSWZ18, author = {Yarkin Dor{\"{o}}z and Jeffrey Hoffstein and Jill Pipher and Joseph H. Silverman and Berk Sunar and William Whyte and Zhenfei Zhang}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Fully Homomorphic Encryption from the Finite Field Isomorphism Problem}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {125--155}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_5}, doi = {10.1007/978-3-319-76578-5\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DorozHPSSWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoffsteinSWZ18, author = {Jeffrey Hoffstein and Joseph H. Silverman and William Whyte and Zhenfei Zhang}, title = {A signature scheme from the finite field isomorphism problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {675}, year = {2018}, url = {https://eprint.iacr.org/2018/675}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoffsteinSWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/HoffsteinPSSWZ17, author = {Jeffrey Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte and Zhenfei Zhang}, editor = {Helena Handschuh}, title = {Choosing Parameters for NTRUEncrypt}, booktitle = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10159}, pages = {3--18}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-52153-4\_1}, doi = {10.1007/978-3-319-52153-4\_1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/HoffsteinPSSWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DorozHPSSWZ17, author = {Yarkin Dor{\"{o}}z and Jeffrey Hoffstein and Jill Pipher and Joseph H. Silverman and Berk Sunar and William Whyte and Zhenfei Zhang}, title = {Fully Homomorphic Encryption from the Finite Field Isomorphism Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {548}, year = {2017}, url = {http://eprint.iacr.org/2017/548}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DorozHPSSWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoffsteinPWZ17, author = {Jeffrey Hoffstein and Jill Pipher and William Whyte and Zhenfei Zhang}, title = {A signature scheme from Learning with Truncation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {995}, year = {2017}, url = {http://eprint.iacr.org/2017/995}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoffsteinPWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/moc/BrokerH16, author = {Reinier Br{\"{o}}ker and Jeffrey Hoffstein}, title = {Fourier coefficients of sextic theta series}, journal = {Math. Comput.}, volume = {85}, number = {300}, pages = {1901--1927}, year = {2016}, url = {https://doi.org/10.1090/mcom3044}, doi = {10.1090/MCOM3044}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/moc/BrokerH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HoffsteinS15, author = {Jeffrey Hoffstein and Joseph H. Silverman}, title = {PASS-Encrypt: a public key cryptosystem based on partial evaluation of polynomials}, journal = {Des. Codes Cryptogr.}, volume = {77}, number = {2-3}, pages = {541--552}, year = {2015}, url = {https://doi.org/10.1007/s10623-015-0089-z}, doi = {10.1007/S10623-015-0089-Z}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HoffsteinS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoffsteinPSSWZ15, author = {Jeffrey Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte and Zhenfei Zhang}, title = {Choosing Parameters for NTRUEncrypt}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {708}, year = {2015}, url = {http://eprint.iacr.org/2015/708}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoffsteinPSSWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoffsteinPSSWZ15a, author = {Jeffrey Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte and Zhenfei Zhang}, title = {DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation - Preliminary Report}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {844}, year = {2015}, url = {http://eprint.iacr.org/2015/844}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoffsteinPSSWZ15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HoffsteinPSSW14, author = {Jeffrey Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte}, editor = {Ioana Boureanu and Philippe Owesarski and Serge Vaudenay}, title = {Practical Signatures from the Partial Fourier Recovery Problem}, booktitle = {Applied Cryptography and Network Security - 12th International Conference, {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8479}, pages = {476--493}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07536-5\_28}, doi = {10.1007/978-3-319-07536-5\_28}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/HoffsteinPSSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/HoffsteinPSSW14, author = {Jeffrey Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte}, editor = {Michele Mosca}, title = {Transcript Secure Signatures Based on Modular Lattices}, booktitle = {Post-Quantum Cryptography - 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8772}, pages = {142--159}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11659-4\_9}, doi = {10.1007/978-3-319-11659-4\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/HoffsteinPSSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoffsteinPSSW14, author = {Jeffrey Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte}, title = {Transcript Secure Signatures Based on Modular Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {457}, year = {2014}, url = {http://eprint.iacr.org/2014/457}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoffsteinPSSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoffsteinPSSW13, author = {Jeffrey Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte}, title = {Practical Signatures from the Partial Fourier Recovery Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {757}, year = {2013}, url = {http://eprint.iacr.org/2013/757}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoffsteinPSSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/WhyteH11, author = {William Whyte and Jeffrey Hoffstein}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{NTRU}}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {858--861}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_464}, doi = {10.1007/978-1-4419-5906-5\_464}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/WhyteH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/HoffsteinHPW10, author = {Jeffrey Hoffstein and Nick Howgrave{-}Graham and Jill Pipher and William Whyte}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {349--390}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_11}, doi = {10.1007/978-3-642-02295-1\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/HoffsteinHPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HirschhornHHW09, author = {Philip S. Hirschhorn and Jeffrey Hoffstein and Nick Howgrave{-}Graham and William Whyte}, editor = {Michel Abdalla and David Pointcheval and Pierre{-}Alain Fouque and Damien Vergnaud}, title = {Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and {MITM} Approaches}, booktitle = {Applied Cryptography and Network Security, 7th International Conference, {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5536}, pages = {437--455}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01957-9\_27}, doi = {10.1007/978-3-642-01957-9\_27}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/HirschhornHHW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Howgrave-GrahamHPW05, author = {Nick Howgrave{-}Graham and Jeffrey Hoffstein and Jill Pipher and William Whyte}, title = {On estimating the lattice security of {NTRU}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {104}, year = {2005}, url = {http://eprint.iacr.org/2005/104}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Howgrave-GrahamHPW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoffsteinHPSW05, author = {Jeffrey Hoffstein and Nick Howgrave{-}Graham and Jill Pipher and Joseph H. Silverman and William Whyte}, title = {Performance Improvements and a Baseline Parameter Generation Algorithm for NTRUSign}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {274}, year = {2005}, url = {http://eprint.iacr.org/2005/274}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoffsteinHPSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/HoffsteinS03, author = {Jeffrey Hoffstein and Joseph H. Silverman}, title = {Random small Hamming weight products with applications to cryptography}, journal = {Discret. Appl. Math.}, volume = {130}, number = {1}, pages = {37--49}, year = {2003}, url = {https://doi.org/10.1016/S0166-218X(02)00588-7}, doi = {10.1016/S0166-218X(02)00588-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dam/HoffsteinS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/HoffsteinHPSW03, author = {Jeffrey Hoffstein and Nick Howgrave{-}Graham and Jill Pipher and Joseph H. Silverman and William Whyte}, editor = {Marc Joye}, title = {{NTRUSIGN:} Digital Signatures Using the {NTRU} Lattice}, booktitle = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2612}, pages = {122--140}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36563-X\_9}, doi = {10.1007/3-540-36563-X\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/HoffsteinHPSW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HoffsteinPS01, author = {Jeffrey Hoffstein and Jill Pipher and Joseph H. Silverman}, editor = {Birgit Pfitzmann}, title = {{NSS:} An {NTRU} Lattice-Based Signature Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {211--228}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_14}, doi = {10.1007/3-540-44987-6\_14}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HoffsteinPS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HoffsteinS00, author = {Jeffrey Hoffstein and Joseph H. Silverman}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {MiniPASS: Authentication and Digital Signatures in a Constrained Environment}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {328--339}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_26}, doi = {10.1007/3-540-44499-8\_26}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/HoffsteinS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ants/HoffsteinPS98, author = {Jeffrey Hoffstein and Jill Pipher and Joseph H. Silverman}, editor = {Joe Buhler}, title = {{NTRU:} {A} Ring-Based Public Key Cryptosystem}, booktitle = {Algorithmic Number Theory, Third International Symposium, ANTS-III, Portland, Oregon, USA, June 21-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1423}, pages = {267--288}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054868}, doi = {10.1007/BFB0054868}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ants/HoffsteinPS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.