nick howgrave-graham
nick howgrave-graham
Head of Software Security Group, Ab Initio Software
Verified email at
Cited by
Cited by
Finding small roots of univariate modular equations revisited
N Howgrave-Graham
Crytography and Coding, 131-142, 1997
NTRUSIGN: Digital signatures using the NTRU lattice
J Hoffstein, N Howgrave-Graham, J Pipher, JH Silverman, W Whyte
Cryptographers’ track at the RSA conference, 122-140, 2003
Approximate integer common divisors
N Howgrave-Graham
International cryptography and lattices conference, 51-66, 2001
Lattice attacks on digital signature schemes
NA Howgrave-Graham, NP Smart
Designs, Codes and Cryptography 23, 283-290, 2001
A hybrid lattice-reduction and meet-in-the-middle attack against NTRU
N Howgrave-Graham
Advances in Cryptology-CRYPTO 2007: 27th Annual International Cryptology …, 2007
The impact of decryption failures on the security of NTRU encryption
N Howgrave-Graham, PQ Nguyen, D Pointcheval, J Proos, JH Silverman, ...
Annual International Cryptology Conference, 226-246, 2003
New generic algorithms for hard knapsacks
N Howgrave-Graham, A Joux
Annual International Conference on the Theory and Applications of …, 2010
Factoring N = prq for Large r
D Boneh, G Durfee, N Howgrave-Graham
Annual International Cryptology Conference, 326-337, 1999
Paillier's cryptosystem revisited
D Catalano, R Gennaro, N Howgrave-Graham, PQ Nguyen
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
Choosing NTRUEncrypt parameters in light of combined lattice reduction and MITM approaches
PS Hirschhorn, J Hoffstein, N Howgrave-Graham, W Whyte
Applied Cryptography and Network Security: 7th International Conference …, 2009
Choosing parameter sets for NTRUEncrypt with NAEP and SVES-3
N Howgrave-Graham, JH Silverman, W Whyte
Cryptographers’ Track at the RSA Conference, 118-135, 2005
A Meet-in-the-Middle Attack on an NTRU Private key
N Howgrave-Graham, JH Silverman, W Whyte
Technical report, NTRU Cryptosystems, June 2003. Report, 2003
Practical lattice-based cryptography: NTRUEncrypt and NTRUSign
J Hoffstein, N Howgrave-Graham, J Pipher, W Whyte
The LLL Algorithm: Survey and Applications, 349-390, 2009
Effective LLL reduction for lattice decoding
C Ling, N Howgrave-Graham
2007 IEEE international symposium on information theory, 196-200, 2007
Rankin’s constant and blockwise lattice reduction
N Gama, N Howgrave-Graham, H Koy, PQ Nguyen
Advances in Cryptology-CRYPTO 2006: 26th Annual International Cryptology …, 2006
The modular inversion hidden number problem
D Boneh, S Halevi, N Howgrave-Graham
Advances in Cryptology—ASIACRYPT 2001: 7th International Conference on the …, 2001
NAEP: Provable security in the presence of decryption failures
N Howgrave-Graham, JH Silverman, A Singer, W Whyte
Cryptology ePrint Archive, 2003
The bit security of Paillier’s encryption scheme and its applications
D Catalano, R Gennaro, N Howgrave-Graham
Advances in Cryptology—EUROCRYPT 2001: International Conference on the …, 2001
Symplectic lattice reduction and NTRU
N Gama, N Howgrave-Graham, PQ Nguyen
Annual International Conference on the Theory and Applications of …, 2006
Reduced and fixed-complexity variants of the LLL algorithm for communications
C Ling, WH Mow, N Howgrave-Graham
IEEE Transactions on Communications 61 (3), 1040-1050, 2013
The system can't perform the operation now. Try again later.
Articles 1–20