Login / Signup
Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key.
Christine van Vredendaal
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
private key
secret key
public key
ciphertext
group signature scheme
signature scheme
key distribution
security analysis
authentication protocol
digital signature
image encryption
diffie hellman
signcryption scheme
encryption scheme
smart card
standard model
secret sharing scheme
key management
hash functions