{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T12:10:56Z","timestamp":1754482256781,"version":"3.28.0"},"reference-count":56,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1109\/ccwc.2019.8666459","type":"proceedings-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T19:58:55Z","timestamp":1552939135000},"page":"0811-0818","source":"Crossref","is-referenced-by-count":10,"title":["An Analysis of Leading Lattice-Based Asymmetric Cryptographic Primitives"],"prefix":"10.1109","author":[{"given":"Chuck","family":"Easttom","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-008-9031-0"},{"key":"ref38","first-page":"288","article-title":"Cryptanalysis of the Goldreich-Goldwasser-Halevi cryptosystem","author":"nguyen","year":"0","journal-title":"2019 Annual International Cryptology Conference"},{"key":"ref33","article-title":"Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: Issues and challenges.","volume":"61","author":"abubakar","year":"2014","journal-title":"Journal of Theoretical & Applied Information Technology"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.22364\/bjmc.2017.5.3.02"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-017-0152-y"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2017.09.009"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s11786-009-0018-5"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-017-0152-y"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-014-9928-6"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2017.09.009"},{"key":"ref28","article-title":"Post-quantum cryptography: lattice-based cryptography and analysis of NTRU public-key cryptosystem","author":"monteiro","year":"2016","journal-title":"Doctoral dissertation"},{"key":"ref27","first-page":"267","article-title":"NTRU: A ring-based public key cryptosystem.","author":"hoffstein","year":"0","journal-title":"1998 International Algorithmic Number Theory Symposium"},{"key":"ref29","article-title":"Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: Issues and challenges.","volume":"61","author":"abubakar","year":"2014","journal-title":"Journal of Theoretical & Applied Information Technology"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-017-1587-x"},{"key":"ref1","first-page":"83","article-title":"Shor&#x2019;s algorithm and factoring: don&#x2019;t throw away the odd orders.","author":"johnston","year":"2017","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref20","first-page":"938","article-title":"Lattice based cryptography for beginners.","author":"chi","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76953-0_5"},{"key":"ref21","article-title":"On the hardness of learning with rounding over small modulus.","author":"bogdanov","year":"0","journal-title":"In 2016 Theory of Cryptography Conference"},{"key":"ref24","article-title":"Towards practical lattice-based public-key encryption on reconfigurable hardware.","author":"p\u00f6ppelmann","year":"0","journal-title":"2013 International Conference on Selected Areas in Cryptography British Columbia"},{"key":"ref23","article-title":"Simply safe lattice cryptography","author":"crockett","year":"2017","journal-title":"Doctoral dissertation"},{"key":"ref26","first-page":"250","article-title":"Multiple private keys with NTRU cryptosystem","volume":"4","author":"nayak","year":"2015","journal-title":"IJRCCT"},{"key":"ref25","first-page":"718","article-title":"NTRU-KE: A Lattice-based Public Key Exchange Protocol.","author":"lei","year":"2013","journal-title":"IACR Cryptology EPrint Archive 2013"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/1527017.1527028"},{"journal-title":"National Institute of Standards Statistical test suite for random and pseudorandom number generators for cryptographic applications NIST 800&#x2013;22 rev 1a","year":"0","key":"ref51"},{"journal-title":"Introduction to Statistics and Data Analysis","year":"2015","author":"peck","key":"ref56"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ECAI.2017.8166460"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s00224-014-9545-9"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.16"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1038\/nature09008"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1515\/jmc.2010.003"},{"article-title":"NSA&#x2019;s Divorce from ECC Causing Crypto Hand-Wringing","year":"2018","author":"mimoso","key":"ref11"},{"key":"ref40","first-page":"941","article-title":"Cryptanalysis of the New Multilinear Map over the Integers.","author":"minaud","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES.2017.8275352"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1007\/978-1-4419-5906-5_417","article-title":"Lattice-based cryptography","author":"micciancio","year":"2011","journal-title":"Encyclopedia of Cryptography and Security"},{"key":"ref14","first-page":"131","article-title":"Lattice-based cryptography.","author":"regev","year":"0","journal-title":"2006 Annual International Cryptology Conference"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1561\/0400000074"},{"journal-title":"Linear Algebra","year":"2014","author":"friedberg","key":"ref16"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-11080-6","author":"axler","year":"2015","journal-title":"Linear Algebra Done Right"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1090\/gsm\/172"},{"journal-title":"Linear Algebra and its Applications","year":"2015","author":"lay","key":"ref19"},{"key":"ref4","article-title":"Simply safe lattice cryptography (Doctoral dissertation).","author":"crockett","year":"0","journal-title":"2017 Retrieved from The Georgia Institute of Technology"},{"key":"ref3","first-page":"314","author":"bernstein","year":"2017","journal-title":"Post-Quantum Cryptography"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s00037-015-0121-8"},{"key":"ref5","article-title":"Efficient identity-based encryption over NTRU lattices.","author":"ducas","year":"0","journal-title":"In 2014 International Conference on the Theory and Application of Cryptology and Information Security"},{"key":"ref8","article-title":"The RSA Algorithm Explored.","volume":"4","author":"easttom","year":"2017","journal-title":"International Journal of Innovative Research in Information Security (IJIRIS)"},{"journal-title":"An Introduction to Mathematical Cryptography","year":"2014","author":"hoffstein","key":"ref7"},{"key":"ref49","article-title":"Quantum Cryptanalysis of NTRU.","author":"fluhrer","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966980"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_20"},{"key":"ref45","article-title":"Challenges for Ring-LWE.","author":"crockett","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_12"},{"key":"ref47","first-page":"1","article-title":"Cryptanalysis of the NTRU signature scheme (NSS)","author":"gentry","year":"0","journal-title":"from Eurocrypt 2001 In 2001 International Conference on the Theory and Application of Cryptology and Information Security"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.5540\/03.2015.003.01.0095"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/3PGCIC.2015.19"},{"key":"ref44","article-title":"Cryptanalysis of ring-LWE based key exchange with key share reuse.","author":"fluhrer","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref43","article-title":"Cryptanalysis of the Quadratic Zero-Testing of GGH.","author":"brakerski","year":"2015","journal-title":"IACR Cryptology ePrint Archive"}],"event":{"name":"2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC)","start":{"date-parts":[[2019,1,7]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2019,1,9]]}},"container-title":["2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8663971\/8666184\/08666459.pdf?arnumber=8666459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:53:53Z","timestamp":1658080433000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8666459\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/ccwc.2019.8666459","relation":{},"subject":[],"published":{"date-parts":[[2019,1]]}}}