Login / Signup
Key recovery attacks on NTRU without ciphertext validation routine.
Daewan Han
Jin Hong
Jae Woo Han
Daesung Kwon
Published in:
IACR Cryptol. ePrint Arch. (2002)
Keyphrases
</>
ciphertext
standard model
private key
public key
proxy re encryption
encryption scheme
group signature scheme
databases
database
high dimensional
intrusion detection
secret key