William Whyte

According to our database1, William Whyte authored at least 41 papers between 1995 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications.
IACR Cryptology ePrint Archive, 2019

Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
A Security Credential Management System for V2X Communications.
IEEE Trans. Intelligent Transportation Systems, 2018

Optimizing Polynomial Convolution for NTRUEncrypt.
IEEE Trans. Computers, 2018

A signature scheme from the finite field isomorphism problem.
IACR Cryptology ePrint Archive, 2018

Optimizing polynomial convolution for NTRUEncrypt.
IACR Cryptology ePrint Archive, 2018

A Security Credential Management System for V2X Communications.
CoRR, 2018

Fully Homomorphic Encryption from the Finite Field Isomorphism Problem.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

2017
Binary Hash Tree based Certificate Access Management.
IACR Cryptology ePrint Archive, 2017

A signature scheme from Learning with Truncation.
IACR Cryptology ePrint Archive, 2017

Fully Homomorphic Encryption from the Finite Field Isomorphism Problem.
IACR Cryptology ePrint Archive, 2017

Binary hash tree based certificate access management for connected vehicles.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Choosing Parameters for NTRUEncrypt.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

2016
Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world.
PoPETs, 2016

NTRU Modular Lattice Signature Scheme on CUDA GPUs.
IACR Cryptology ePrint Archive, 2016

NTRU modular lattice signature scheme on CUDA GPUs.
Proceedings of the International Conference on High Performance Computing & Simulation, 2016

2015
A quantum-safe circuit-extension handshake for Tor.
IACR Cryptology ePrint Archive, 2015

DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation - Preliminary Report.
IACR Cryptology ePrint Archive, 2015

Choosing Parameters for NTRUEncrypt.
IACR Cryptology ePrint Archive, 2015

Threat and Countermeasures Analysis for WAVE Service Advertisement.
Proceedings of the IEEE 18th International Conference on Intelligent Transportation Systems, 2015

2014
Transcript Secure Signatures Based on Modular Lattices.
IACR Cryptology ePrint Archive, 2014

Transcript Secure Signatures Based on Modular Lattices.
Proceedings of the Post-Quantum Cryptography - 6th International Workshop, 2014

Practical Signatures from the Partial Fourier Recovery Problem.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Practical Signatures from the Partial Fourier Recovery Problem.
IACR Cryptology ePrint Archive, 2013

A security credential management system for V2V communications.
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013

2011
NTRU.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2010
Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign.
Proceedings of the LLL Algorithm - Survey and Applications, 2010

2009
SLOW: A Practical pseudonym changing scheme for location privacy in VANETs.
Proceedings of the IEEE Vehicular Networking Conference, 2009

Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2007
Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls.
Proceedings of the Topics in Cryptology, 2007

2005
Ntru.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3.
IACR Cryptology ePrint Archive, 2005

On estimating the lattice security of NTRU.
IACR Cryptology ePrint Archive, 2005

Performance Improvements and a Baseline Parameter Generation Algorithm for NTRUSign.
IACR Cryptology ePrint Archive, 2005

Choosing Parameter Sets forwithand.
Proceedings of the Topics in Cryptology, 2005

2004
Modified Parameter Attacks: Practical Attacks against CCA2 Secure Cryptosystems and Countermeasures.
IACR Cryptology ePrint Archive, 2004

2003
NAEP: Provable Security in the Presence of Decryption Failures.
IACR Cryptology ePrint Archive, 2003

On the Bit Security of NTRUEncrypt.
Proceedings of the Public Key Cryptography, 2003

NTRUSIGN: Digital Signatures Using the NTRU Lattice.
Proceedings of the Topics in Cryptology, 2003

The Impact of Decryption Failures on the Security of NTRU Encryption.
Proceedings of the Advances in Cryptology, 2003

1995
Statistical mechanics of neural networks.
PhD thesis, 1995


  Loading...