Blum, M., Goldwasser, S., “An efficient Probabilistic Public-Key Encryption Scheme Which Hides all Partial Information,” Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science, vol. 196, Springer-Verlag, 1985, pp. 289-299. |
Coppersmith, D., Shamir, A., “Lattice Attacks on NTRU,” preprint, Apr. 5, 1997, presented at Eurocrypt 97, pp. 1-13. |
Goldreich, O., Goldwasser, S., Halevi, S., “Public-Key Cryptosystems From Lattice Reduction Problems,” MIT-Laboratory for Computer Science preprint, Nov. 1996, pp. 0-29. |
Hoffstein, J., Pipher, J., Silverman, J.H., “NTRU: A Ring-Based Public Key Cryptosystem,” preprint, presented at the rump session of Crypto 96, pp. I-1-I-18. |
Schnorr, C.P., Hoerner, H.H., “Attacking the Chor Rivest Cryptosystem by Improved Lattice Reduction,” Proc. EUROCRYPT 1995, Lecture Notes in Computer Science, vol. 921, Springer-Verlag, 1995, pp 1-12. |
Stinson, D., “Crytography: Theory and Practice,” CRC Press, Boca Raton, 1995, pp. 114-203. |
Goldwasser, S., Micali, S., “Probabilistic Encryption” J. Computer and Systems Science, vol. 28, (1984) pp 270-299. |
McEliece, R.J., “A Public-Key Cryptosystem Based on Algebraic Coding Theory,” JPL Pasadena, DSN Progress Reports, vol. 42-44 (1978) pp. 114-116. |