Literatura
[1] Shor, P. W. "Algorithms for quantum computation: discrete logarithm and factoring". FOCS, 1994., str. 124-134.
[2] NIST Physics Laboratory: "NIST demonstrates universal programmable quantum processor for quantum computers", 2009.
[3] Wikipedia the free encyclopedia: "Cryptography".
[4] Budin, L. "Operacijski sustavi 2", predavanja. Zagreb, Fakultet elektrotehnike i računarstva, 2003.
[5] Škorić, N. "Kriptoanaliza kroz primjere". Seminarski rad. Zagreb, Fakultet elektrotehnike i računarstva, 2005.
[6] Krivačić, V. "Kriptiranje eliptičkim krivuljama". Diplomski rad. Zagreb, Fakultet elektrotehnike i računarstva, 2006.
[7] Wikipedia the free encyclopedia: "Cryptographic primitive".
[8] Dujella, A. "Diskretna matematika", predavanja.
[9] Krešić-Jurić, S. "Algebarske strukture", predavanja. Split, Prirodoslovno-matematički fakultet, 2009.
[10] Žubrinić, D. "Linearna algebra", predavanja. Zagreb, Fakultet elektrotehnike i računarstva, 2002.
[11] Micciancio, D.; Goldwasser, S. "Complexity of lattice problems: a cryptographic perspective". Springer, 2002.
[12] Pancheva, K. "On lattices, codes and Regev's cryptosystem". Bachelor thesis. University of Technology Darmstadt, 2007.
[13] Hoffstein, J.; Pipher, J.; Silverman, J. H. "An introduction to mathematical cryptography". Springer, 2008.
[14] Wikipedia the free encyclopedia: "Trapdoor function".
[15] Lloyd, S. "Quantum Information Science". MIT Lecture notes, 2009.
[16] Wikipedia the free encyclopedia: "Knapsack problem".
[17] Regev, O. "LLL algorithm". Lattices in computer science, lecture 2. Tel Aviv University, 2004.
[18] Schnorr, C. P.; Euchner, M. "Lattice basis reduction: improved practical algorithms and solving subset sum problems". FOCS, 1991., str. 68-85.
[19] Babai, L. "On Lovasz' lattice reduction and the nearest lattice point problem". Combinatorica, 6(1), 1986., str. 1-13.
[20] Hrg, D. "Simulator kvantnog računala". Diplomski rad. Zagreb, Fakultet elektrotehnike i računarstva, 2004.
[21] Jakuš, M. "Kvantna kriptografija". Seminarski rad. Zagreb, Fakultet elektrotehnike i računarstva, 2004.
[22] Hoffstein, J.; Pipher, J.; Silverman, J. H. "NTRU: A ring-based public key cryptosystem". ANT, 1998., str 267-288.
[23] NTRU Cryptosystems, Inc. "The NTRU public key cryptosystem – a tutorial".
[24] Malović, I. "Asimetrični kriptosustavi zasnovani na rešetkama". Seminarski rad. Fakultet elektrotehnike i računarstva, 2009.
[25] Proos, J. A. "Imperfect decryption anda n attack on the NTRU encryption sheme". IACR Cryptology ePrint Archive, 2003.
[26] Mersin, A. "The comparative performance analysis of lattice based NTRU cryptosystem with other asymmetrical cryptosystems". Master thesis. Izmir Institute of Technology, Turska, 2007.
[27] Whyte, W; et al. "IEEE P1363.1 Draft 10: Draft Standard for Public Key Cryptographic Techniques Based on Hard Problems over Lattices". 2008.
[28] Howgrave-Graham, N.; Silverman, J. H.; Whyte, W. "A Meet-in-the-middle attack on an NTRU private key" NTRU Cryptosystems Technical Report #004, Version 2, 2003.
[29] Monteverde, M. "NTRU software implementation for constrained devices". Master thesis. Katholieke Universiteit Leuven, Belgija, 2008.
[30] Howgrave-Graham, N. "A hybrid lattice-reduction and meet-in-the-middle attack against NTRU". CRYPTO 2007., str. 150-169.
[31] Howgrave-Graham, N.; Silverman, J. H.; Singer, A; Whyte, W. "NAEP: Provable security in the presence of decryption failures". IACR Cryptology ePrint Archive, 2003.
[32] Howgrave-Graham, N.; Silverman, J. H.; Whyte, W. "Choosing parameter sets for NTRUEncrypt with NAEP and SVES-3". CT-RSA, 2005.
[33] Hoffstein, J.; Pipher, J.; Silverman, J. H. "NSS: The NTRU Signature Sheme". Eurocrypt '01, LNCS 2045.
[34] Gentry, C.; Jonsson, J.; Stern, J.; Szydlo, M. "Cryptanalysis oft he NTRU signature Sheme (NSS) from Eurocrypt '01". 2001.
[35] Hoffstein, J.; Howgrave-Graham, N.; Pipher, J.; Silverman, J. H.; Whyte, W. "NTRUSign: Digital signatures using the NTRU lattice". CT-RSA, 2002.
[36] Nguyen, P. Q.; Regev, O. "Learning a parallelepiped: Cryptanalysis of GGH and NTRU signatures". Journal of Cryptology, Volume 22 (2), 2008.
[37] Silverman, J. H. "Almost inverses and fast NTRU key creation". NTRU Cryptosystems Technical Report #014, Version 1, 1999.
![]() |
![]() |