메뉴 건너뛰기




Volumn 5536 LNCS, Issue , 2009, Pages 437-455

Choosing NTRUEncrypt parameters in light of combined lattice reduction and MITM approaches

Author keywords

[No Author keywords available]

Indexed keywords

GENERATION ALGORITHM; LATTICE REDUCTION; MEET-IN-THE-MIDDLE; STANDARD BODIES;

EID: 68849115998     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-01957-9_27     Document Type: Conference Paper
Times cited : (71)

References (20)
  • 1
    • 51249173801 scopus 로고    scopus 로고
    • Babai, L.: On Lovasz lattice reduction and the nearest lattice point problem. Combinatorica 6(1), 1-13 (1986)
    • Babai, L.: On Lovasz" lattice reduction and the nearest lattice point problem. Combinatorica 6(1), 1-13 (1986)
  • 2
    • 77956089601 scopus 로고    scopus 로고
    • Factorization of a 512-bit RSA modulus
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Cavallar, S., Dodson, B., Lenstra, A.K., Lioen, W., Montgomery, P.L., Murphy, B., te Riele, H.J.J., et al.: Factorization of a 512-bit RSA modulus. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 1-17. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 1-17
    • Cavallar, S.1    Dodson, B.2    Lenstra, A.K.3    Lioen, W.4    Montgomery, P.L.5    Murphy, B.6    te Riele, H.J.J.7
  • 3
    • 84957355408 scopus 로고    scopus 로고
    • Lattice Attack on NTRU
    • Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
    • Coppersmith, D., Shamir, A.: Lattice Attack on NTRU. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 52-61. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1233 , pp. 52-61
    • Coppersmith, D.1    Shamir, A.2
  • 4
    • 44449128937 scopus 로고    scopus 로고
    • Predicting lattice reduction
    • Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
    • Gama, N., Nguyen, P.Q.: Predicting lattice reduction. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 31-51. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 31-51
    • Gama, N.1    Nguyen, P.Q.2
  • 5
    • 84945126587 scopus 로고    scopus 로고
    • Key recovery and message attacks on NTRU-composite
    • Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
    • Gentry, C.: Key recovery and message attacks on NTRU-composite. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, p. 182. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 182
    • Gentry, C.1
  • 6
    • 84947808606 scopus 로고    scopus 로고
    • Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: A new high speed public key cryptosystem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, 1423, pp. 267-288. Springer, Heidelberg (1998)
    • Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: A new high speed public key cryptosystem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 267-288. Springer, Heidelberg (1998)
  • 7
    • 68849115316 scopus 로고    scopus 로고
    • Hoffstein, J., Silverman, J.H.: Invertibility in truncated polynomial rings. Technical report, NTRU Cryptosystems, Report #009, version 1 (October 1998), http://www.ntru.com
    • Hoffstein, J., Silverman, J.H.: Invertibility in truncated polynomial rings. Technical report, NTRU Cryptosystems, Report #009, version 1 (October 1998), http://www.ntru.com
  • 8
    • 0041967528 scopus 로고    scopus 로고
    • Random small hamming weight products with applications to cryptography
    • Hoffstein, J., Silverman, J.H.: Random small hamming weight products with applications to cryptography. Discrete Applied Mathematics 130(1), 37-49 (2003)
    • (2003) Discrete Applied Mathematics , vol.130 , Issue.1 , pp. 37-49
    • Hoffstein, J.1    Silverman, J.H.2
  • 9
    • 35248868901 scopus 로고    scopus 로고
    • The Impact of Decryption Failures on the Security of NTRU Encryption
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Howgrave-Graham, N., Nguyen, P., Pointcheval, D., Proos, J., Silverman, J.H., Singer, A., Whyte, W.: The Impact of Decryption Failures on the Security of NTRU Encryption. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 226-246. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 226-246
    • Howgrave-Graham, N.1    Nguyen, P.2    Pointcheval, D.3    Proos, J.4    Silverman, J.H.5    Singer, A.6    Whyte, W.7
  • 10
    • 33646827775 scopus 로고    scopus 로고
    • NAEP: Provable Security in the Presence of Decryption Failures IACR ePrint Archive
    • Report 2003-172
    • Howgrave-Graham, N., Silverman, J.H., Singer, A., Whyte, W.: NAEP: Provable Security in the Presence of Decryption Failures IACR ePrint Archive, Report 2003-172, http://eprint.iacr.org/2003/172/
    • Howgrave-Graham, N.1    Silverman, J.H.2    Singer, A.3    Whyte, W.4
  • 12
    • 38049125101 scopus 로고    scopus 로고
    • A hybrid meet-in-the-middle and lattice reduction attack on NTRU
    • Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
    • Howgrave-Graham, N.: A hybrid meet-in-the-middle and lattice reduction attack on NTRU. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 150-169. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 150-169
    • Howgrave-Graham, N.1
  • 14
    • 0000653210 scopus 로고    scopus 로고
    • Selecting Cryptographic Key Sizes
    • Lenstra, A., Verheul, E.: Selecting Cryptographic Key Sizes. Journal of Cryptology 14(4), 255-293 (2001)
    • (2001) Journal of Cryptology , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.1    Verheul, E.2
  • 15
    • 84958950822 scopus 로고    scopus 로고
    • Micciancio, D.: Improving Lattice Based Cryptosystems Using the Hermite Normal Form. In: Silverman, J.H. (ed.) CaLC 2001. LNCS, 2146, pp. 126-145. Springer, Heidelberg (2001)
    • Micciancio, D.: Improving Lattice Based Cryptosystems Using the Hermite Normal Form. In: Silverman, J.H. (ed.) CaLC 2001. LNCS, vol. 2146, pp. 126-145. Springer, Heidelberg (2001)
  • 16
    • 40249100243 scopus 로고    scopus 로고
    • Mol, P., Yung, M.: Recovering NTRU Secret Key from Inversion Oracles. In: Cramer, R. (ed.) PKC 2008. LNCS, 4939, pp. 18-36. Springer, Heidelberg (2008)
    • Mol, P., Yung, M.: Recovering NTRU Secret Key from Inversion Oracles. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 18-36. Springer, Heidelberg (2008)
  • 17
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120-126 (1978)
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.M.3
  • 18
    • 84869713415 scopus 로고    scopus 로고
    • RSA Laboratories
    • RSA Laboratories, RSAES-OAEP Encryption Scheme, ftp://ftp.rsasecurity. com/pub/rsalabs/rsa/-algorithm/rsa-oaep-spec.pdf
    • RSAES-OAEP Encryption Scheme
  • 19
    • 35248874386 scopus 로고    scopus 로고
    • Lattice Reduction by Random Sampling and Birthday Methods
    • Alt, H, Habib, M, eds, STACS 2003, Springer, Heidelberg
    • Schnorr, C.P.: Lattice Reduction by Random Sampling and Birthday Methods. In: Alt, H., Habib, M. (eds.) STACS 2003. LNCS, vol. 2607, pp. 145-156. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2607 , pp. 145-156
    • Schnorr, C.P.1
  • 20
    • 84955603054 scopus 로고    scopus 로고
    • Hidden Collisions on DSS
    • Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
    • Vaudenay, S.: Hidden Collisions on DSS. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 83-88. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 83-88
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.