Jill Pipher
Brown University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jill Pipher.
algorithmic number theory symposium | 1998
Jeffrey Hoffstein; Jill Pipher; Joseph H. Silverman
We describe NTRU, a new public key cryptosystem. NTRU features reasonably short, easily created keys, high speed, and low memory requirements. NTRU encryption and decryption use a mixing system suggested by polynomial algebra combined with a clustering principle based on elementary probability theory. The security of the NTRU cryptosystem comes from the interaction of the polynomial mixing system with the independence of reduction modulo two relatively prime integers p and q.
the cryptographers track at the rsa conference | 2003
Jeffrey Hoffstein; Nick Howgrave-Graham; Jill Pipher; Joseph H. Silverman; William Whyte
We present a mechanism to encrypt to an arbitrary collection of identities using a variant of the Boneh-Franklin identity based encryption scheme. The decryptor is defined by a logical formulae of conjunctions and disjunctions. This enables a simple mechanism to drive access control to broadcast encrypted data using user identities as the public keys.
Acta Mathematica | 2004
Camil Muscalu; Jill Pipher; Terence Tao; Christoph Thiele
In the first part of the paper we prove a bi-parameter version of a well known multilinear theorem of Coifman and Meyer. As a consequence, we generalize the Kato-Ponce inequality in nonlinear PDE, obtaining a fractional Leibnitz rule for derivatives in the
theory and application of cryptographic techniques | 2001
Jeffrey Hoffstein; Jill Pipher; Joseph H. Silverman
x_1
Revista Matematica Iberoamericana | 2006
Camil Muscalu; Jill Pipher; Terence Tao; Christoph Thiele
and
Publicacions Matematiques | 2001
Carlos E. Kenig; Jill Pipher
x_2
Journal of the American Mathematical Society | 2014
Steve Hofmann; Carlos E. Kenig; Svitlana Mayboroda; Jill Pipher
directions simultaneously. Then, we show that the double bilinear Hilbert transform does not satisfy any
American Journal of Mathematics | 2009
Michael T. Lacey; Stefanie Petermichl; Jill Pipher; Brett D. Wick
L^p
the cryptographers’ track at the rsa conference | 2017
Jeffrey Hoffstein; Jill Pipher; John M. Schanck; Joseph H. Silverman; William Whyte; Zhenfei Zhang
estimates.
The LLL Algorithm | 2009
Jeffrey Hoffstein; Nick Howgrave-Graham; Jill Pipher; William Whyte
A new authentication and digital signature scheme called the NTRU Signature Scheme (NSS) is introduced. NSS provides an authentication/signature method complementary to the NTRU public key cryptosystem. The hard lattice problem underlying NSS is similar to the hard problem underlying NTRU, and NSS similarly features high speed, low footprint, and easy key creation.