Joseph H. Silverman

Orcid: 0000-0003-3887-3248

According to our database1, Joseph H. Silverman authored at least 41 papers between 1986 and 2022.

Collaborative distances:



In proceedings 
PhD thesis 


Online presence:



A Heuristic Subexponential Algorithm to Find Paths in Markoff Graphs Over Finite Fields.
CoRR, 2022

MMSAT: A Scheme for Multimessage Multiuser Signature Aggregation.
IACR Cryptol. ePrint Arch., 2020

A signature scheme from the finite field isomorphism problem.
IACR Cryptol. ePrint Arch., 2018

Fully Homomorphic Encryption from the Finite Field Isomorphism Problem.
IACR Cryptol. ePrint Arch., 2017

DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation - Preliminary Report.
IACR Cryptol. ePrint Arch., 2015

Choosing Parameters for NTRUEncrypt.
IACR Cryptol. ePrint Arch., 2015

PASS-Encrypt: a public key cryptosystem based on partial evaluation of polynomials.
Des. Codes Cryptogr., 2015

Transcript Secure Signatures Based on Modular Lattices.
IACR Cryptol. ePrint Arch., 2014

Practical Signatures from the Partial Fourier Recovery Problem.
IACR Cryptol. ePrint Arch., 2013

Elliptic curves.
Proceedings of the Handbook of Finite Fields., 2013

Amicable Pairs and Aliquot Cycles for Elliptic Curves.
Exp. Math., 2011

Local-global aspects of (hyper)elliptic curves over (in)finite fields.
Adv. Math. Commun., 2010

A Survey of Local and Global Pairings on Elliptic Curves and Abelian Varieties.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

Lifting and Elliptic Curve Discrete Logarithms.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls.
Proceedings of the Topics in Cryptology, 2007

Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3.
IACR Cryptol. ePrint Arch., 2005

Performance Improvements and a Baseline Parameter Generation Algorithm for NTRUSign.
IACR Cryptol. ePrint Arch., 2005

Choosing Parameter Sets forwithand.
Proceedings of the Topics in Cryptology, 2005

Modified Parameter Attacks: Practical Attacks against CCA2 Secure Cryptosystems and Countermeasures.
IACR Cryptol. ePrint Arch., 2004

An Algebraic Approach to NTRU (q = 2n) via Witt Vectors and Overdetermined Systems of Nonlinear Equations.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

NAEP: Provable Security in the Presence of Decryption Failures.
IACR Cryptol. ePrint Arch., 2003

Random small Hamming weight products with applications to cryptography.
Discret. Appl. Math., 2003

NTRUSIGN: Digital Signatures Using the NTRU Lattice.
Proceedings of the Topics in Cryptology, 2003

The Impact of Decryption Failures on the Security of NTRU Encryption.
Proceedings of the Advances in Cryptology, 2003

On the Linear Complexity of the Naor-Reingold Pseudo-random Function from Elliptic Curves.
Des. Codes Cryptogr., 2001

NSS: An NTRU Lattice-Based Signature Scheme.
Proceedings of the Advances in Cryptology, 2001

NTRU in Constrained Devices.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001

Dimension Reduction Methods for Convolution Modular Lattices.
Proceedings of the Cryptography and Lattices, International Conference, 2001

On the distribution of integer points on curves of genus zero.
Theor. Comput. Sci., 2000

The Xedni Calculus and the Elliptic Curve Discrete Logarithm Problem.
Des. Codes Cryptogr., 2000

Analysis of the Xedni Calculus Attack.
Des. Codes Cryptogr., 2000

Lattices, cryptography, and the NTRU public key cryptosystem.
Proceedings of the Unusual Applications of Number Theory, 2000

MiniPASS: Authentication and Digital Signatures in a Constrained Environment.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000

Computing rational points on rank 1 elliptic curves via L-series and canonical heights.
Math. Comput., 1999

Fast Multiplication in Finite Fields GF(2<sup>N</sup>).
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999

Elliptic Curve Discrete Logarithms and the Index Calculus.
Proceedings of the Advances in Cryptology, 1998

NTRU: A Ring-Based Public Key Cryptosystem.
Proceedings of the Algorithmic Number Theory, Third International Symposium, 1998

Computing canonical heights with little (or no) factorization.
Math. Comput., 1997

Computing the canonical height on K3 surfaces.
Math. Comput., 1996

Exceptional Units and Numbers of Small Mahler Measure.
Exp. Math., 1995

The arithmetic of elliptic curves.
Graduate texts in mathematics 106, Springer, ISBN: 978-3-540-96203-8, 1986