Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jill Pipher is active.

Publication


Featured researches published by Jill Pipher.


algorithmic number theory symposium | 1998

NTRU: A Ring-Based Public Key Cryptosystem

Jeffrey Hoffstein; Jill Pipher; Joseph H. Silverman

We describe NTRU, a new public key cryptosystem. NTRU features reasonably short, easily created keys, high speed, and low memory requirements. NTRU encryption and decryption use a mixing system suggested by polynomial algebra combined with a clustering principle based on elementary probability theory. The security of the NTRU cryptosystem comes from the interaction of the polynomial mixing system with the independence of reduction modulo two relatively prime integers p and q.


the cryptographers track at the rsa conference | 2003

NTRUSign: digital signatures using the NTRU lattice

Jeffrey Hoffstein; Nick Howgrave-Graham; Jill Pipher; Joseph H. Silverman; William Whyte

We present a mechanism to encrypt to an arbitrary collection of identities using a variant of the Boneh-Franklin identity based encryption scheme. The decryptor is defined by a logical formulae of conjunctions and disjunctions. This enables a simple mechanism to drive access control to broadcast encrypted data using user identities as the public keys.


Acta Mathematica | 2004

Bi-parameter paraproducts

Camil Muscalu; Jill Pipher; Terence Tao; Christoph Thiele

In the first part of the paper we prove a bi-parameter version of a well known multilinear theorem of Coifman and Meyer. As a consequence, we generalize the Kato-Ponce inequality in nonlinear PDE, obtaining a fractional Leibnitz rule for derivatives in the


theory and application of cryptographic techniques | 2001

NSS: An NTRU Lattice-Based Signature Scheme

Jeffrey Hoffstein; Jill Pipher; Joseph H. Silverman

x_1


Revista Matematica Iberoamericana | 2006

Multi-parameter paraproducts

Camil Muscalu; Jill Pipher; Terence Tao; Christoph Thiele

and


Publicacions Matematiques | 2001

THE DIRICHLET PROBLEM FOR ELLIPTIC EQUATIONS WITH DRIFT TERMS

Carlos E. Kenig; Jill Pipher

x_2


Journal of the American Mathematical Society | 2014

Square function/non-tangential maximal function estimates and the Dirichlet problem for non-symmetric elliptic operators

Steve Hofmann; Carlos E. Kenig; Svitlana Mayboroda; Jill Pipher

directions simultaneously. Then, we show that the double bilinear Hilbert transform does not satisfy any


American Journal of Mathematics | 2009

Multiparameter Riesz commutators

Michael T. Lacey; Stefanie Petermichl; Jill Pipher; Brett D. Wick

L^p


the cryptographers’ track at the rsa conference | 2017

Choosing Parameters for NTRUEncrypt

Jeffrey Hoffstein; Jill Pipher; John M. Schanck; Joseph H. Silverman; William Whyte; Zhenfei Zhang

estimates.


The LLL Algorithm | 2009

Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign

Jeffrey Hoffstein; Nick Howgrave-Graham; Jill Pipher; William Whyte

A new authentication and digital signature scheme called the NTRU Signature Scheme (NSS) is introduced. NSS provides an authentication/signature method complementary to the NTRU public key cryptosystem. The hard lattice problem underlying NSS is similar to the hard problem underlying NTRU, and NSS similarly features high speed, low footprint, and easy key creation.

Collaboration


Dive into the Jill Pipher's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Michael T. Lacey

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Lesley Ward

University of South Australia

View shared research outputs
Top Co-Authors

Avatar

Brett D. Wick

Washington University in St. Louis

View shared research outputs
Top Co-Authors

Avatar

Ji Li

Macquarie University

View shared research outputs
Researchain Logo
Decentralizing Knowledge