메뉴 건너뛰기




Volumn 1880, Issue , 2000, Pages 20-35

A chosen-ciphertext attack against NTRU

Author keywords

[No Author keywords available]

Indexed keywords

POLYNOMIALS; PUBLIC KEY CRYPTOGRAPHY;

EID: 84974588978     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44598-6_2     Document Type: Conference Paper
Times cited : (58)

References (12)
  • 6
    • 84958629363 scopus 로고    scopus 로고
    • Reaction attacks against several public-key cryptosystems
    • G. Goos, J. Hartmanis, and J; van Leeuwen, editors, Springer-Verlag
    • Chris Hall, Ian Goldberg, and Bruce Schneier. Reaction attacks against several public-key cryptosystems. In G. Goos, J. Hartmanis, and J; van Leeuwen, editors, ICICS’99, volume 1726 of Lecture Notes in Computer Science, pages 2-12. Springer-Verlag, 1999.
    • (1999) ICICS’99, Volume 1726 of Lecture Notes in Computer Science , pp. 2-12
    • Hall, C.1    Goldberg, I.2    Schneier, B.3
  • 9
    • 0030709604 scopus 로고    scopus 로고
    • On the importance of securing your bins: The garbage-man-in-the-middle attack
    • M. Joye and J.-J. Quisquater. On the importance of securing your bins: the garbage-man-in-the-middle attack. 4th ACM Conf. Computer Comm. Security, pages 135-141, 1997.
    • (1997) 4Th ACM Conf. Computer Comm. Security , pp. 135-141
    • Joye, M.1    Quisquater, J.-J.2
  • 10
    • 34250244723 scopus 로고
    • Factoring polynomials with polynomial coefficients
    • A.K. Lenstra, H.W. Lenstra, and L. Lovász. Factoring polynomials with polynomial coefficients. Math. Annalen, 261:515-534, 1982.
    • (1982) Math. Annalen , vol.261 , pp. 515-534
    • Lenstra, A.K.1    Lenstra, H.W.2    Lovász, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.