Reduced memory meet-in-the-middle attack against the NTRU private key.
Christine van VredendaalPublished in: LMS J. Comput. Math. (2016)
Keyphrases
- private key
- secret key
- ciphertext
- public key
- group signature scheme
- signature scheme
- security analysis
- diffie hellman
- authentication protocol
- digital signature
- key distribution
- smart card
- mutual authentication
- similarity measure
- encryption scheme
- signcryption scheme
- secret sharing scheme
- low cost
- image encryption
- image reconstruction
- high dimensional
- image compression
- standard model
- key management
- end to end