Login / Signup

Subfield Attack on NTRU by using symmetric function map.

Shixin TianZhili DongKunpeng WangChang Lv
Published in: ISIT (2023)
Keyphrases
  • real time
  • piecewise linear
  • neural network
  • artificial intelligence
  • objective function
  • support vector
  • access control
  • secret key
  • key exchange protocol