William Whyte

According to our database1, William Whyte authored at least 35 papers between 1995 and 2020.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Modular lattice signatures, revisited.
Des. Codes Cryptogr., 2020

An actuatable soft reservoir modulates host foreign body response.
Sci. Robotics, 2019

Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications.
IACR Cryptol. ePrint Arch., 2019

A Security Credential Management System for V2X Communications.
IEEE Trans. Intell. Transp. Syst., 2018

Optimizing Polynomial Convolution for NTRUEncrypt.
IEEE Trans. Computers, 2018

A signature scheme from the finite field isomorphism problem.
IACR Cryptol. ePrint Arch., 2018

Binary Hash Tree based Certificate Access Management.
IACR Cryptol. ePrint Arch., 2017

A signature scheme from Learning with Truncation.
IACR Cryptol. ePrint Arch., 2017

Fully Homomorphic Encryption from the Finite Field Isomorphism Problem.
IACR Cryptol. ePrint Arch., 2017

Binary hash tree based certificate access management for connected vehicles.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world.
PoPETs, 2016

NTRU Modular Lattice Signature Scheme on CUDA GPUs.
IACR Cryptol. ePrint Arch., 2016

A quantum-safe circuit-extension handshake for Tor.
IACR Cryptol. ePrint Arch., 2015

DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation - Preliminary Report.
IACR Cryptol. ePrint Arch., 2015

Choosing Parameters for NTRUEncrypt.
IACR Cryptol. ePrint Arch., 2015

Threat and Countermeasures Analysis for WAVE Service Advertisement.
Proceedings of the IEEE 18th International Conference on Intelligent Transportation Systems, 2015

Transcript Secure Signatures Based on Modular Lattices.
IACR Cryptol. ePrint Arch., 2014

Practical Signatures from the Partial Fourier Recovery Problem.
IACR Cryptol. ePrint Arch., 2013

A security credential management system for V2V communications.
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign.
Proceedings of the LLL Algorithm - Survey and Applications, 2010

SLOW: A Practical pseudonym changing scheme for location privacy in VANETs.
Proceedings of the IEEE Vehicular Networking Conference, 2009

Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls.
Proceedings of the Topics in Cryptology, 2007

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3.
IACR Cryptol. ePrint Arch., 2005

On estimating the lattice security of NTRU.
IACR Cryptol. ePrint Arch., 2005

Performance Improvements and a Baseline Parameter Generation Algorithm for NTRUSign.
IACR Cryptol. ePrint Arch., 2005

Choosing Parameter Sets forwithand.
Proceedings of the Topics in Cryptology, 2005

Modified Parameter Attacks: Practical Attacks against CCA2 Secure Cryptosystems and Countermeasures.
IACR Cryptol. ePrint Arch., 2004

NAEP: Provable Security in the Presence of Decryption Failures.
IACR Cryptol. ePrint Arch., 2003

On the Bit Security of NTRUEncrypt.
Proceedings of the Public Key Cryptography, 2003

NTRUSIGN: Digital Signatures Using the NTRU Lattice.
Proceedings of the Topics in Cryptology, 2003

The Impact of Decryption Failures on the Security of NTRU Encryption.
Proceedings of the Advances in Cryptology, 2003

Statistical mechanics of neural networks.
PhD thesis, 1995