{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T08:37:17Z","timestamp":1765960637186},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642119248"},{"type":"electronic","value":"9783642119255"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11925-5_6","type":"book-chapter","created":{"date-parts":[[2010,2,15]],"date-time":"2010-02-15T02:41:05Z","timestamp":1266201665000},"page":"73-88","source":"Crossref","is-referenced-by-count":40,"title":["Speed Records for NTRU"],"prefix":"10.1007","author":[{"given":"Jens","family":"Hermans","sequence":"first","affiliation":[]},{"given":"Frederik","family":"Vercauteren","sequence":"additional","affiliation":[]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","first-page":"79","volume-title":"ASAP 2008","author":"A.C. At\u0131c\u0131","year":"2008","unstructured":"At\u0131c\u0131, A.C., Batina, L., Fan, J., Verbauwhede, I., Yal\u00e7\u0131n, S.B.O.: Low-cost implementations of NTRU for pervasive security. In: ASAP 2008, pp. 79\u201384. IEEE Computer Society, Los Alamitos (2008)"},{"key":"6_CR2","unstructured":"ECRYPT AZTEC. Lightweight Asymmetric Cryptography and Alternatives to RSA (2005)"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/3-540-44709-1_22","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"D.V. Bailey","year":"2001","unstructured":"Bailey, D.V., Coffin, D., Elbirt, A.J., Silverman, J.H., Woodbury, A.D.: NTRU in Constrained Devices. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 262\u2013272. Springer, Heidelberg (2001)"},{"key":"6_CR4","first-page":"57","volume":"800","author":"E. Barker","year":"2007","unstructured":"Barker, E., Barker, W., Burr, W., Polk, W., Smid, M.: Recommendation for Key Management. NIST special publication\u00a0800, 57 (2007)","journal-title":"NIST special publication"},{"key":"6_CR5","unstructured":"Bernstein, D.J., Chen, H.C., Chen, M.S., Cheng, C.M., Hsiao, C.H., Lange, T., Lin, Z.C., Yang, B.Y.: The Billion-Mulmod-Per-Second PC. In: SHARCS 2009, pp. 131\u2013144 (2009)"},{"issue":"3-4","key":"6_CR6","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W. Bosma","year":"1997","unstructured":"Bosma, W., Cannon, J., Playoust, C.: The Magma Algebra System I: The User Language. Journal of Symbolic Computation\u00a024(3-4), 235\u2013265 (1997)","journal-title":"Journal of Symbolic Computation"},{"key":"6_CR7","volume-title":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","author":"H. Cohen","year":"2006","unstructured":"Cohen, H., Frey, G., Avanzi, R.: Handbook of Elliptic and Hyperelliptic Curve Cryptography. CRC Press, Boca Raton (2006)"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1007\/978-3-540-30574-3_23","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"D. Cook","year":"2005","unstructured":"Cook, D., Ioannidis, J., Keromytis, A.D., Luck, J.: Cryptographics: Secret key cryptography using graphics cards. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 334\u2013350. Springer, Heidelberg (2005)"},{"key":"6_CR9","unstructured":"Dai, W.: Crypto++: benchmarks, \n                    \n                      http:\/\/www.cryptopp.com\/benchmarks.html"},{"key":"6_CR10","unstructured":"Ecrypt Ebats. ECRYPT benchmarking of asymmetric systems (2007), \n                    \n                      http:\/\/www.ecrypt.eu.org\/ebats\/"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-540-72584-8_28","volume-title":"Computational Science \u2013 ICCS 2007","author":"S. Fleissner","year":"2007","unstructured":"Fleissner, S.: GPU-Accelerated Montgomery Exponentiation. In: Shi, Y., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds.) ICCS 2007. LNCS, vol.\u00a04487, pp. 213\u2013220. Springer, Heidelberg (2007)"},{"key":"6_CR12","unstructured":"Consortium for Efficient Embedded\u00a0Security. Efficient embedded security standards #1: Implementation aspects of NTRU and NSS, Version 1 (2002)"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/3-540-44987-6_12","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"C. Gentry","year":"2001","unstructured":"Gentry, C.: Key Recovery and Message Attacks on NTRU-Composite. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 182\u2013194. Springer, Heidelberg (2001)"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-540-74735-2_15","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"O. Harrison","year":"2007","unstructured":"Harrison, O., Waldron, J.: AES Encryption Implementation and Analysis on Commodity Graphics Processing Units. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 209\u2013226. Springer, Heidelberg (2007)"},{"issue":"1","key":"6_CR15","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/S0166-218X(02)00588-7","volume":"130","author":"J. Hoffstein","year":"2003","unstructured":"Hoffstein, J., Silverman, J.H.: Random small Hamming weight products with applications to cryptography. Discrete Applied Mathematics\u00a0130(1), 37\u201349 (2003)","journal-title":"Discrete Applied Mathematics"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-540-74143-5_9","volume-title":"Advances in Cryptology - CRYPTO 2007","author":"N. Howgrave-Graham","year":"2007","unstructured":"Howgrave-Graham, N.: A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.\u00a04622, pp. 150\u2013169. Springer, Heidelberg (2007)"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1007\/978-3-540-45146-4_14","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"N. Howgrave-Graham","year":"2003","unstructured":"Howgrave-Graham, N., Nguyen, P.Q., Pointcheval, D., Proos, J., Silverman, J.H., Singer, A., Whyte, W.: The impact of decryption failures on the security of ntru encryption. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 226\u2013246. Springer, Heidelberg (2003)"},{"key":"6_CR18","unstructured":"Intel. Intel Pentium 4 - SL8Q9 Datasheet (2008)"},{"key":"6_CR19","unstructured":"Karu, P., Loikkanen, J.: Practical Comparison of Fast Public-key Cryptosystems (2001), \n                    \n                      http:\/\/www.tml.tkk.fi\/Opinnot\/Tik-110.501\/2000\/papers\/"},{"key":"6_CR20","first-page":"65","volume-title":"ICSPC 2007","author":"S.A. Manavski","year":"2007","unstructured":"Manavski, S.A.: CUDA Compatible GPU as an Efficient Hardware Accelerator for AES Cryptography. In: ICSPC 2007, November 2007, pp. 65\u201368. IEEE, Los Alamitos (2007)"},{"key":"6_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/978-3-540-77272-9_22","volume-title":"Cryptography and Coding","author":"A. Moss","year":"2007","unstructured":"Moss, A., Page, D., Smart, N.P.: Toward Acceleration of RSA Using 3D Graphics Hardware. In: Galbraith, S.D. (ed.) Cryptography and Coding 2007. LNCS, vol.\u00a04887, pp. 364\u2013383. Springer, Heidelberg (2007)"},{"key":"6_CR22","unstructured":"Nvidia. Compute Unified Device Architecture Programming Guide (2007)"},{"key":"6_CR23","unstructured":"Nvidia. GeForce GTX280 - GeForce GTX 200 GPU Datasheet (2008)"},{"issue":"2","key":"6_CR24","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"issue":"12","key":"6_CR25","first-page":"20","volume":"2007","author":"M. Settings","year":"2007","unstructured":"Settings, M.: Password crackers see bigger picture. Network Security\u00a02007(12), 20 (2007)","journal-title":"Network Security"},{"key":"6_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-540-85053-3_6","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"R. Szerwinski","year":"2008","unstructured":"Szerwinski, R., G\u00fcneysu, T.: Exploiting the Power of GPUs for Asymmetric Cryptography. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.\u00a05154, pp. 79\u201399. Springer, Heidelberg (2008)"},{"key":"6_CR27","unstructured":"Whyte, W., Howgrave-Graham, N., Hoffstein, J., Pipher, J., Silverman, J.H., Hirschhorn, P.: IEEE P1363.1: Public Key Cryptographic Techniques Based on Hard Problems over Lattices"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology - CT-RSA 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11925-5_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:45:27Z","timestamp":1606167927000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11925-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642119248","9783642119255"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11925-5_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}