Login / Signup
Cryptanalysis of NTRU with two Public Keys.
Abderrahmane Nitaj
Published in:
Int. J. Netw. Secur. (2014)
Keyphrases
</>
secret key
hash functions
group signature scheme
signature scheme
scatter search
real world
machine learning
information retrieval
decision trees
information technology
pairwise
smart card
block cipher
xml keys