Login / Signup

Key Recovery Attacks on NTRU without Ciphertext Validation Routine.

Daewan HanJin HongJae Woo HanDaesung Kwon
Published in: ACISP (2003)
Keyphrases
  • ciphertext
  • standard model
  • private key
  • group signature scheme
  • secret key
  • encryption scheme
  • proxy re encryption
  • relational databases
  • xml documents
  • public key
  • cca secure