C. Aguilar-melchor, J. Barrier, S. Guelton, A. Guinet, M. Killijian et al., Topics in Cryptology -CT-RSA 2016: The Cryptographers' Track at the RSA Conference, Proceedings, chapter NFLlib: NTT-Based Fast Lattice Library, pp.341-356, 2016.

M. Albrecht, S. Bai, and L. Ducas, A Subfield Lattice Attack on Overstretched NTRU Assumptions, IACR Cryptology ePrint Archive, vol.130, issue.1, p.127, 2016.
DOI : 10.1017/S0004972715001288

URL : https://hal.archives-ouvertes.fr/hal-01394211

J. Bajard, J. Eynard, N. Merkiche, and T. Plantard, RNS Arithmetic Approach in Lattice-Based Cryptography: Accelerating the " Rounding-o? " Core Procedure, Computer Arithmetic (ARITH), 2015 IEEE 22nd Symposium on, pp.113-120, 2015.

J. W. Bos, K. Lauter, J. Loftus, and M. Naehrig, Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme, Cryptography and Coding, pp.45-64, 2013.
DOI : 10.1007/978-3-642-45239-0_4

Z. Brakerski, Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP, Advances in Cryptology -Crypto 2012, 2012.
DOI : 10.1007/978-3-642-32009-5_50

Z. Brakerski, C. Gentry, and V. Vaikuntanathan, (Leveled) Fully Homomorphic Encryption Without Bootstrapping, Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, ITCS '12, pp.309-325

L. Ducas, A. Durmus, T. Lepoint, and V. Lyubashevsky, Advances in Cryptology ? CRYPTO 2013: 33rd Annual Cryptology Conference, Proceedings, Part I, chapter Lattice Signatures and Bimodal Gaussians, pp.40-56, 2013.

L. Ducas, V. Lyubashevsky, T. P. Kaoshiung, and R. O. Taiwan, Advances in Cryptology ? ASIACRYPT 2014, 20th International Conference on the Theory and Application of Cryptology and Information Security Proceedings, Part II, chapter Ecient Identity-Based Encryption over NTRU Lattices, pp.22-41, 2014.

J. Fan and F. Vercauteren, Somewhat practical fully homomorphic encryption. IACR Cryptology ePrint Archive, p.2012

H. L. Garner, The Residue Number System, Papers Presented at the the Western Joint Computer Conference, IRE-AIEE-ACM '59 (Western), pp.146-153, 1959.

C. Gentry, Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178, 2009.
DOI : 10.1145/1536414.1536440

T. Granlund, . Development-team, . Gnu, and . Mp, The GNU Multiple Precision Arithmetic Library, 6.1.0 edition, 2015.

J. Ho?stein, J. Pipher, and J. H. Silverman, NTRU: A Ring-Based Public Key Cryptosystem, In Lecture Notes in Computer Science, pp.267-288, 1998.

V. Lyubashevsky, Advances in Cryptology ? EUROCRYPT 2012, 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, chapter Lattice Signatures without Trapdoors, pp.738-755, 2012.

P. L. Montgomery, Modular multiplication without trial division, Mathematics of Computation, vol.44, issue.170, pp.519-521, 1985.
DOI : 10.1090/S0025-5718-1985-0777282-X