William Whyte

According to our database1, William Whyte authored at least 35 papers between 1995 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Modular lattice signatures, revisited.
Des. Codes Cryptogr., 2020

2019
An actuatable soft reservoir modulates host foreign body response.
Sci. Robotics, 2019

Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications.
IACR Cryptol. ePrint Arch., 2019

2018
A Security Credential Management System for V2X Communications.
IEEE Trans. Intell. Transp. Syst., 2018

Optimizing Polynomial Convolution for NTRUEncrypt.
IEEE Trans. Computers, 2018

A signature scheme from the finite field isomorphism problem.
IACR Cryptol. ePrint Arch., 2018

2017
Binary Hash Tree based Certificate Access Management.
IACR Cryptol. ePrint Arch., 2017

A signature scheme from Learning with Truncation.
IACR Cryptol. ePrint Arch., 2017

Fully Homomorphic Encryption from the Finite Field Isomorphism Problem.
IACR Cryptol. ePrint Arch., 2017

Binary hash tree based certificate access management for connected vehicles.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

2016
Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world.
PoPETs, 2016

NTRU Modular Lattice Signature Scheme on CUDA GPUs.
IACR Cryptol. ePrint Arch., 2016

2015
A quantum-safe circuit-extension handshake for Tor.
IACR Cryptol. ePrint Arch., 2015

DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation - Preliminary Report.
IACR Cryptol. ePrint Arch., 2015

Choosing Parameters for NTRUEncrypt.
IACR Cryptol. ePrint Arch., 2015

Threat and Countermeasures Analysis for WAVE Service Advertisement.
Proceedings of the IEEE 18th International Conference on Intelligent Transportation Systems, 2015

2014
Transcript Secure Signatures Based on Modular Lattices.
IACR Cryptol. ePrint Arch., 2014

2013
Practical Signatures from the Partial Fourier Recovery Problem.
IACR Cryptol. ePrint Arch., 2013

A security credential management system for V2V communications.
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013

2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2010
Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign.
Proceedings of the LLL Algorithm - Survey and Applications, 2010

2009
SLOW: A Practical pseudonym changing scheme for location privacy in VANETs.
Proceedings of the IEEE Vehicular Networking Conference, 2009

Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2007
Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls.
Proceedings of the Topics in Cryptology, 2007

2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3.
IACR Cryptol. ePrint Arch., 2005

On estimating the lattice security of NTRU.
IACR Cryptol. ePrint Arch., 2005

Performance Improvements and a Baseline Parameter Generation Algorithm for NTRUSign.
IACR Cryptol. ePrint Arch., 2005

Choosing Parameter Sets forwithand.
Proceedings of the Topics in Cryptology, 2005

2004
Modified Parameter Attacks: Practical Attacks against CCA2 Secure Cryptosystems and Countermeasures.
IACR Cryptol. ePrint Arch., 2004

2003
NAEP: Provable Security in the Presence of Decryption Failures.
IACR Cryptol. ePrint Arch., 2003

On the Bit Security of NTRUEncrypt.
Proceedings of the Public Key Cryptography, 2003

NTRUSIGN: Digital Signatures Using the NTRU Lattice.
Proceedings of the Topics in Cryptology, 2003

The Impact of Decryption Failures on the Security of NTRU Encryption.
Proceedings of the Advances in Cryptology, 2003

1995
Statistical mechanics of neural networks.
PhD thesis, 1995


  Loading...