[1]
|
G. Gaubatz, J. P. Kaps and B. Sunar, “Public Key Cryptography in Sensor Networks—Revisited,” 1st European Workshop on Security in Ad-Hoc and Sensor Networks, 2005, pp. 2-18
|
[2]
|
J. Hoffstein, J. Pipher and J. H. Sil-verman, “NTRU: A Ring-Base Public Key Cryptosystem,” In: J. P. Buhler, Ed., Algorithmic Number Theory (ANTS III), Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1998, pp. 267-288,.
|
[3]
|
C. M. O’Rourke, “Efficient NTRU Implementations,” Master Thesis, Worcester Polytechnic Institute, Worcester, 2002.
|
[4]
|
J. Kaps, “Cryptography for Ultra-Low Power Devices,” Ph.D. Thesis, Worcester Polytechnic Institute, Worcester, 2006.
|
[5]
|
A. C. Atici, L. Batina, J. Fan, I. Verbauwhede and S. B. O. Yalcin, “Low-Cost Implementations of NTRU for Pervasive Security,” International Conference on Application-Specific Systems, Architectures and Processors, 2008. pp. 79-84.
|
[6]
|
J. Hoffstein and J. Silverman, “Optimizations for NTRU,” Public-Key Cryptography and Computational Number Theory: Proceedings of the International Conference organized by the Stefan Banach International Mathematical Center Warsaw, Poland, September 11-15, 2000, p. 77.
|
[7]
|
J. Hoffstein and J. H. Silverman, “Random Small Hamming Weight Products with Applications to Cryptography,” Discrete Applied Mathematics, Vol. 130, No. 1, 2003, pp. 37-49.
|
[8]
|
J. H. Silverman and W. Whyte, “Estimating Decryption Failure Probabilities for NTRUencrypt,” Technical Report, NTRU Cryptosystems, 2005, Technical Report No. 18, Version 1.
|