dblp.uni-trier.dewww.uni-trier.de

Nick Howgrave-Graham

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
20EENick Howgrave-Graham: A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU. CRYPTO 2007: 150-169
2006
19EENicolas Gama, Nick Howgrave-Graham, Henrik Koy, Phong Q. Nguyen: Rankin's Constant and Blockwise Lattice Reduction. CRYPTO 2006: 112-130
18EENicolas Gama, Nick Howgrave-Graham, Phong Q. Nguyen: Symplectic Lattice Reduction and NTRU. EUROCRYPT 2006: 233-253
17EEDon Coppersmith, Nick Howgrave-Graham, Phong Q. Nguyen, Igor Shparlinski: Testing set proportionality and the Ádám isomorphism of circulant graphs. J. Discrete Algorithms 4(2): 324-335 (2006)
2005
16EENick Howgrave-Graham, Joseph H. Silverman, William Whyte: Choosing Parameter Sets forwithand. CT-RSA 2005: 118-135
2004
15EENick Howgrave-Graham, Michael Szydlo: A Method to Solve Cyclotomic Norm Equations. ANTS 2004: 272-279
2003
14EEPierre-Alain Fouque, Nick Howgrave-Graham, Gwenaëlle Martinet, Guillaume Poupard: The Insecurity of Esign in Practical Implementations. ASIACRYPT 2003: 492-506
13EENick Howgrave-Graham, Phong Q. Nguyen, David Pointcheval, John Proos, Joseph H. Silverman, Ari Singer, William Whyte: The Impact of Decryption Failures on the Security of NTRU Encryption. CRYPTO 2003: 226-246
12EEJeffrey Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joseph H. Silverman, William Whyte: NTRUSIGN: Digital Signatures Using the NTRU Lattice. CT-RSA 2003: 122-140
11 Nick Howgrave-Graham, Phong Q. Nguyen, Igor Shparlinski: Hidden number problem with hidden multipliers, timed-release crypto, and noisy exponentiation. Math. Comput. 72(243): 1473-1485 (2003)
2002
10EEDario Catalano, Rosario Gennaro, Nick Howgrave-Graham: Paillier's Trapdoor Function Hides up to O(n) Bits. J. Cryptology 15(4): 251-269 (2002)
2001
9EEDario Catalano, Rosario Gennaro, Nick Howgrave-Graham, Phong Q. Nguyen: Paillier's cryptosystem revisited. ACM Conference on Computer and Communications Security 2001: 206-214
8EEDan Boneh, Shai Halevi, Nick Howgrave-Graham: The Modular Inversion Hidden Number Problem. ASIACRYPT 2001: 36-51
7EENick Howgrave-Graham, Joan G. Dyer, Rosario Gennaro: Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor. CHES 2001: 93-102
6EENick Howgrave-Graham: Approximate Integer Common Divisors. CaLC 2001: 51-66
5EEDario Catalano, Rosario Gennaro, Nick Howgrave-Graham: The Bit Security of Paillier's Encryption Scheme and Its Applications. EUROCRYPT 2001: 229-243
4 Nick Howgrave-Graham, Nigel P. Smart: Lattice Attacks on Digital Signature Schemes. Des. Codes Cryptography 23(3): 283-290 (2001)
1999
3EENick Howgrave-Graham, Jean-Pierre Seifert: Extending Wiener's Attack in the Presence of Many Decrypting Exponents. CQRE 1999: 153-166
2EEDan Boneh, Glenn Durfee, Nick Howgrave-Graham: Factoring N = prq for Large r. CRYPTO 1999: 326-337
1997
1 Nick Howgrave-Graham: Finding Small Roots of Univariate Modular Equations Revisited. IMA Int. Conf. 1997: 131-142

Coauthor Index

1Dan Boneh [2] [8]
2Dario Catalano [5] [9] [10]
3Don Coppersmith [17]
4Glenn Durfee [2]
5Joan G. Dyer [7]
6Pierre-Alain Fouque [14]
7Nicolas Gama [18] [19]
8Rosario Gennaro [5] [7] [9] [10]
9Shai Halevi [8]
10Jeffrey Hoffstein [12]
11Henrik Koy [19]
12Gwenaëlle Martinet [14]
13Phong Q. Nguyen [9] [11] [13] [17] [18] [19]
14Jill Pipher [12]
15David Pointcheval [13]
16Guillaume Poupard [14]
17John Proos [13]
18Jean-Pierre Seifert [3]
19Igor Shparlinski [11] [17]
20Joseph H. Silverman [12] [13] [16]
21Ari Singer [13]
22Nigel P. Smart [4]
23Michael Szydlo [15]
24William Whyte [12] [13] [16]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)