1 |
J. Hoffstein and J.H. Silverman, "Optimizations for NTRU," Proceedings of
Public Key Cryptography and Computational Number Theory, pp. 1-12, Sep
2000
|
2 |
G. Gaubatz, J.P. Kaps, and B. Sunar, "Public key cryptography in sensor
networks-Revisited," ESAS 2004, LNCS3313, pp. 2-18, 2004
|
3 |
P.C. Kocher. "Timing Attacks on Implementations of Diffie-Hellman.RSA. DSS. and Other Systems." Advances in Cryptology, CRYPTO '96. LNCS1109, pp. 10S-113. 1996
|
4 |
http://www.ntru.com/cryptolab/faqs.htm
|
5 |
T.S. Messerges, "Using Second-Order Power Analysis to Attack DPA Resistant Software," CHES 2000, LNCS 1965, pp. 238-251, 2000
|
6 |
E. Brier. C. Clavier. and F. Olivier. "Correlation Power Analysis with a Leakage Model," CHES 2004, LNCS 3156,pp. 16-29, 2004
|
7 |
E. Oswald, S. Mangard, C. Herbst, and S. Tillich, "Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers,"CT-RSA 2006, LNCS 3860, pp. 192-207, 2006
|
8 |
W. Whyte et aI., "Draft Standard for Public-Key Cryptographic Techniques
Based on Hard Problems over Lattices," Oct. 2006
|
9 |
D.V. Bailey, D. Coffin, A. Elbirt, J.H. Silverman, and A.D. Woodbury,"NTRU in constrained devices," CHES 2001. LNCS 2162, pp. 262-272, 2001
|
10 |
J. Hoffstein, J. Pipher, and J.H. Silverman, "NTRU: A Ring-Based Public Key Cryptosystem," Algorithmic Number Theory(ANTSlll), LNCS 1423, pp. 267-288,1998
|
11 |
A. Atici, L. Batina, B. Gierlichs, and 1. Verbauwhede, "Power analysis on NTRU
implementations for RFIDs: First results," In Workshop on RFID Security
2008, pp. 128-139, July 2008
|
12 |
P. Kocher, J. Jaffe. and B. Jun. "Differential power analysis." Advances in Cryptology, CRYPTO '99. LNCS 1666. pp. 388-397, 1999
|