Cryptanalysis of ITRU
From MaRDI portal
Publication:5025959
DOI10.21857/yrvgqtexl9zbMath1484.94020arXiv2005.09258OpenAlexW3198534324MaRDI QIDQ5025959
No author found.
Publication date: 7 February 2022
Published in: Sv. 25(2021)=knj. 60 (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/2005.09258
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A Mathematical Theory of Communication
- Attacks on Shamir's `RSA for paranoids'
- NTRU over rings beyond \(\mathbb{Z}\)
- Parallel symmetric attack on NTRU using non-deterministic lattice reduction
- Cryptanalysis of an NTRU-based proxy encryption scheme from ASIACCS'15
- A wrap error attack against NTRUEncrypt
- A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU
- Communication Theory of Secrecy Systems*
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Elliptic Curve Cryptosystems
- A method for obtaining digital signatures and public-key cryptosystems
- Recovering NTRU Secret Key from Inversion Oracles
- MaTRU: A New NTRU-Based Cryptosystem
- Complexity and Cryptography
This page was built for publication: Cryptanalysis of ITRU