An analysis of NTRU-cryptosystem and its security :: IKBFU's united scientific journal editorial office

×

Login
Password
Forgot your password?
Login As
You can log in if you are registered at one of these services:
   
There is only one science. Two sciences are impossible as two universes are
Alexander Herzen

DOI-generator Search by DOI on Crossref.org

An analysis of NTRU-cryptosystem and its security

Author Kirshanova E. A.
Pages 112-115
Article Download
Keywords NTRU-cryptosystem, polynomial truncated ring, lattices, meet-in-the-middle attack.
Abstract (summary) The structure of NTRU cryptosystem is described. Variants of attacks on NTRU cryptosystem, particularly an attack based on lattices are considered.
References

1. The NTRU public key cryptosystem // A tutorial. The NTRU Cryptosystems, Inc. URL: http://securityinnovation. com/cryptolab/tutorials. shtml.

2. Hoffstein J., Silverman J. Optimization for NTRU // Public-key cryptography and computational number theory. Berlin-N.-Y.: Walter de Gruyter, 2001.

3. Micciiancio D., Regev O. Lattice-based cryptography. July 22, 2008.

4. Hoffstein J., Lieman D., Pipjer J., Silverman J. NTRU: A public key cryptosystem. URL: http://grouper. ieee. org/groups/1363/lattPK/submissions/ntru. pdf.

5. Howgrave-Graha N., Silverman J., Whyte W. Meet-in-the-middle attack on an NTRU private key // NTRU Cryptosystems Technical Report #004. Version 2.

6. Hoffstein J., Pipher J., Silverman J. An introduction to mathematical cryptogra­phy. Springer. 2008.

7. Galbraith S. Mathematic of public key cryptography.

8. Hoffstein J., Howgrave-Graham N., Pipher J., Silverman J. Practical lattice-based cryptography: NTRUEncrypt and NTRUSign.

9. Application security, secure software development, and software secure train­ing. URL: http://securityinnovation. com.


Back to the section