نتایج جستجو برای: ntru

تعداد نتایج: 255  

Journal: :International Journal of Computer Applications 2015

Journal: :Information technology and security 2022

.

2017
Kenneth G. Paterson Ricardo Villanueva-Polanco

Cold boot attacks target memory remanence effects in hardware to secret key material. Such attacks were first explored in the scientific literature by Halderman et al. (USENIX Security Symposium 2008) and, since then, different attacks have been developed against a range of asymmetric key and symmetric key algorithms. Such attacks in general receive as input a noisy version of the secret key as...

2010
Jeffrey Hoffstein Nick Howgrave-Graham Jill Pipher William Whyte

W e provide a brief history and overview of lattice based cryptography and cryptanalysis: shortest vector problems, closest vector problems, subset sum problem and knapsack systems, GGH, Ajtai-Dwork and NTRU. A detailed discussion of the algorithms NTRUEncrypt and NTRUSign follows. These algorithms have attractive operating speed and keysize and are based on hard problems that are seemingly int...

Journal: :IACR Cryptology ePrint Archive 2017
Dung Hoang Duong Masaya Yasuda Tsuyoshi Takagi

Albrecht et al. [1] at Crypto 2016 and Cheon et al. [4] at ANTS 2016 independently presented a subfield attack on overstretched NTRU problem. Their idea is to map the public key down to the subfield (by norm and trace map respectively) and hence obtain a lattice of smaller dimension for which a lattice reduction algorithm is efficiently applicable. At Eurocrypt 2017, Kirchner and Fouque propose...

Journal: :ICST Transactions on Security and Safety 2021

Journal: :Lecture Notes in Computer Science 2023

Lattice gadgets and the associated algorithms are essential building blocks of lattice-based cryptography. In past decade, they have been applied to build versatile powerful cryptosystems. However, practical optimizations designs gadget-based schemes generally lag their theoretical constructions. For example, signatures elegant design capability extending more advanced primitives, but far less ...

2012
Sonia Mihaela Bogos Serge Vaudenay

In this article we present a lattice attack done on a NTRU-like scheme introduced by Verkhovsky in [1]. We show how, based on the relation between the public and private key, we can construct an attack which allows any passive adversary to decrypt the encrypted messages. We explain, step by step, how an attacker can construct an equivalent private key and guess what the original plaintext was. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید