Login / Signup
Key Recovery Attacks on NTRU without Ciphertext Validation Routine.
Daewan Han
Jin Hong
Jae Woo Han
Daesung Kwon
Published in:
ACISP (2003)
Keyphrases
</>
ciphertext
standard model
private key
group signature scheme
secret key
encryption scheme
proxy re encryption
relational databases
xml documents
public key
cca secure