The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Nick Howgrave-Graham: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Nick Howgrave-Graham, Michael Szydlo
    A Method to Solve Cyclotomic Norm Equations. [Citation Graph (0, 0)][DBLP]
    ANTS, 2004, pp:272-279 [Conf]
  2. Dan Boneh, Shai Halevi, Nick Howgrave-Graham
    The Modular Inversion Hidden Number Problem. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:36-51 [Conf]
  3. Pierre-Alain Fouque, Nick Howgrave-Graham, Gwenaëlle Martinet, Guillaume Poupard
    The Insecurity of Esign in Practical Implementations. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:492-506 [Conf]
  4. Nick Howgrave-Graham
    Approximate Integer Common Divisors. [Citation Graph (0, 0)][DBLP]
    CaLC, 2001, pp:51-66 [Conf]
  5. Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham, Phong Q. Nguyen
    Paillier's cryptosystem revisited. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:206-214 [Conf]
  6. Nick Howgrave-Graham, Joan G. Dyer, Rosario Gennaro
    Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:93-102 [Conf]
  7. Nick Howgrave-Graham, Jean-Pierre Seifert
    Extending Wiener's Attack in the Presence of Many Decrypting Exponents. [Citation Graph (0, 0)][DBLP]
    CQRE, 1999, pp:153-166 [Conf]
  8. Nick Howgrave-Graham, Phong Q. Nguyen, David Pointcheval, John Proos, Joseph H. Silverman, Ari Singer, William Whyte
    The Impact of Decryption Failures on the Security of NTRU Encryption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:226-246 [Conf]
  9. Dan Boneh, Glenn Durfee, Nick Howgrave-Graham
    Factoring N = prq for Large r. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:326-337 [Conf]
  10. Nicolas Gama, Nick Howgrave-Graham, Henrik Koy, Phong Q. Nguyen
    Rankin's Constant and Blockwise Lattice Reduction. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2006, pp:112-130 [Conf]
  11. Jeffrey Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joseph H. Silverman, William Whyte
    NTRUSIGN: Digital Signatures Using the NTRU Lattice. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:122-140 [Conf]
  12. Nick Howgrave-Graham, Joseph H. Silverman, William Whyte
    Choosing Parameter Sets forwithand. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:118-135 [Conf]
  13. Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham
    The Bit Security of Paillier's Encryption Scheme and Its Applications. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2001, pp:229-243 [Conf]
  14. Nicolas Gama, Nick Howgrave-Graham, Phong Q. Nguyen
    Symplectic Lattice Reduction and NTRU. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:233-253 [Conf]
  15. Nick Howgrave-Graham
    Finding Small Roots of Univariate Modular Equations Revisited. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1997, pp:131-142 [Conf]
  16. Nick Howgrave-Graham, Nigel P. Smart
    Lattice Attacks on Digital Signature Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2001, v:23, n:3, pp:283-290 [Journal]
  17. Don Coppersmith, Nick Howgrave-Graham, Phong Q. Nguyen, Igor Shparlinski
    Testing set proportionality and the Ádám isomorphism of circulant graphs. [Citation Graph (0, 0)][DBLP]
    J. Discrete Algorithms, 2006, v:4, n:2, pp:324-335 [Journal]
  18. Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham
    Paillier's Trapdoor Function Hides up to O(n) Bits. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2002, v:15, n:4, pp:251-269 [Journal]
  19. Nick Howgrave-Graham, Phong Q. Nguyen, Igor Shparlinski
    Hidden number problem with hidden multipliers, timed-release crypto, and noisy exponentiation. [Citation Graph (0, 0)][DBLP]
    Math. Comput., 2003, v:72, n:243, pp:1473-1485 [Journal]
  20. Nick Howgrave-Graham
    A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2007, pp:150-169 [Conf]

  21. Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches. [Citation Graph (, )][DBLP]


  22. New Generic Algorithms for Hard Knapsacks. [Citation Graph (, )][DBLP]


  23. Variants of the LLL Algorithm in Digital Communications: Complexity Analysis and Fixed-Complexity Implementation [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.305secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002