Key Recovery Attacks on NTRU without Ciphertext Validation Routine

Daewan Han, Jin Hong, Jae Woo Han, Daesung Kwon. Key Recovery Attacks on NTRU without Ciphertext Validation Routine. In Reihaneh Safavi-Naini, Jennifer Seberry, editors, Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings. Volume 2727 of Lecture Notes in Computer Science, pages 274-284, Springer, 2003. [doi]

Abstract

Abstract is missing.