메뉴 건너뛰기




Volumn 4450 LNCS, Issue , 2007, Pages 89-106

New chosen-ciphertext attacks on NTRU

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; PARAMETER ESTIMATION; QUERY PROCESSING; SECURITY SYSTEMS; SET THEORY;

EID: 38049020482     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-71677-8_7     Document Type: Conference Paper
Times cited : (24)

References (17)
  • 1
    • 38049053937 scopus 로고    scopus 로고
    • Consortium for Efficient Embedded Security. Efficient embedded security standards #1: Implementation aspects of NTRU and NSS, 2001.
    • Consortium for Efficient Embedded Security. Efficient embedded security standards #1: Implementation aspects of NTRU and NSS, 2001.
  • 2
    • 38049082433 scopus 로고    scopus 로고
    • Consortium for Efficient Embedded Security. Efficient embedded security standards #1: Implementation aspects of NTRUEncrypt and NTRUSign, 2002.
    • Consortium for Efficient Embedded Security. Efficient embedded security standards #1: Implementation aspects of NTRUEncrypt and NTRUSign, 2002.
  • 3
    • 38049034724 scopus 로고    scopus 로고
    • Key recovery and message attacks on NTRU-composite
    • IACR, Springer-Verlag
    • C. Gentry. Key recovery and message attacks on NTRU-composite. In Proc. of Eurocrypt '01, volume 2045 of LNCS. IACR, Springer-Verlag, 2001.
    • (2001) Proc. of Eurocrypt '01, volume 2045 of LNCS
    • Gentry, C.1
  • 4
    • 35248821952 scopus 로고    scopus 로고
    • Cryptanalysis of the NTRU signature scheme (NSS) from Eurocrypt 2001
    • Proc. of Asiacrypt '01, of, Springer-Verlag
    • C. Gentry, J. Jonsson, J. Stern, and M. Szydlo. Cryptanalysis of the NTRU signature scheme (NSS) from Eurocrypt 2001. In Proc. of Asiacrypt '01, volume 2248 of LNCS. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2248
    • Gentry, C.1    Jonsson, J.2    Stern, J.3    Szydlo, M.4
  • 5
    • 84947222499 scopus 로고    scopus 로고
    • Cryptanalysis of the revised NTRU signature scheme
    • Proc. of Eurocrypt '02, of, Springer-Verlag
    • C. Gentry and M. Szydlo. Cryptanalysis of the revised NTRU signature scheme. In Proc. of Eurocrypt '02, volume 2332 of LNCS. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2332
    • Gentry, C.1    Szydlo, M.2
  • 6
    • 33646854822 scopus 로고    scopus 로고
    • Key recovery attacks on NTRU without ciphertext validation routine. ACISP 2003
    • D. Han, J. Hong, J. W. Han, and D. Kwon. Key recovery attacks on NTRU without ciphertext validation routine. ACISP 2003, LNCS 2727:pages 274-284, 2003.
    • (2003) LNCS , vol.2727 , pp. 274-284
    • Han, D.1    Hong, J.2    Han, J.W.3    Kwon, D.4
  • 7
    • 33646262791 scopus 로고    scopus 로고
    • NTRUSIGN: Digital signatures using the NTRU lattice
    • Proc. of CT-RSA, of, Springer-Verlag
    • J. Hoffstein, N. A. Howgrave-Graham, J. Pipher, J. H. Silverman, and W. Whyte. NTRUSIGN: Digital signatures using the NTRU lattice. In Proc. of CT-RSA, volume 2612 of LNCS. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2612
    • Hoffstein, J.1    Howgrave-Graham, N.A.2    Pipher, J.3    Silverman, J.H.4    Whyte, W.5
  • 8
    • 84947808606 scopus 로고    scopus 로고
    • J. Hoffstein, J. Pipher, and J. Silverman. NTRU: a ring based public key cryptosystem. In Proc. of ANTS III, 1423 of LNCS, pages 267-288. Springer-Verlag, 1998. First presented at the rump session of Crypto '96.
    • J. Hoffstein, J. Pipher, and J. Silverman. NTRU: a ring based public key cryptosystem. In Proc. of ANTS III, volume 1423 of LNCS, pages 267-288. Springer-Verlag, 1998. First presented at the rump session of Crypto '96.
  • 11
    • 35248868901 scopus 로고    scopus 로고
    • N. A. Howgrave-Graham, P. Q. Nguyen, D. Pointcheval, J. Proos., J. H. Silverman, A. Singer, and W. Whyte. The impact of decryption failures on the security of NTRU encryption. In Proc. of the 23rd Cryptology Conference (Crypto '03), 2729 of LNCS, pages 226-246. IACR, Springer-Verlag, 2003.
    • N. A. Howgrave-Graham, P. Q. Nguyen, D. Pointcheval, J. Proos., J. H. Silverman, A. Singer, and W. Whyte. The impact of decryption failures on the security of NTRU encryption. In Proc. of the 23rd Cryptology Conference (Crypto '03), volume 2729 of LNCS, pages 226-246. IACR, Springer-Verlag, 2003.
  • 14
    • 33746038898 scopus 로고    scopus 로고
    • Learning a parallelepiped: Cryptanalysis of GGH and NTRU signatures
    • S. Vaudenay, editor, Proc. of Eurocrypt '06, of, Springer
    • P. Q. Nguyen and O. Regev. Learning a parallelepiped: cryptanalysis of GGH and NTRU signatures. In S. Vaudenay, editor, Proc. of Eurocrypt '06, volume 4004 of LNCS, pages 271-288. Springer, 2006.
    • (2006) LNCS , vol.4004 , pp. 271-288
    • Nguyen, P.Q.1    Regev, O.2
  • 15
    • 38049015186 scopus 로고    scopus 로고
    • V. Shoup. Number Theory C, Library (NTL) version 5.4. Available at
    • V. Shoup. Number Theory C++ Library (NTL) version 5.4. Available at http://wvw.shoup.net/ntl/.
  • 16
    • 38049047452 scopus 로고    scopus 로고
    • J. H. Silverman. Invertibility in truncated polynomial rings. Technical report, NTRU Cryptosystems
    • available at
    • J. H. Silverman. Invertibility in truncated polynomial rings. Technical report, NTRU Cryptosystems, 2003. Technical reports available at http://www.ntru.com.
    • (2003) Technical reports
  • 17
    • 38049066183 scopus 로고    scopus 로고
    • Technical report n. 18, version 1: Estimating decryption failure probabilities for ntruencrypt
    • Technical report, NTRU Cryptosystems, 2005
    • J. H. Silverman and W. Whyte. Technical report n. 18, version 1: Estimating decryption failure probabilities for ntruencrypt. Technical report, NTRU Cryptosystems, 2005.
    • Silverman, J.H.1    Whyte, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.