Meet-in-the-Middle Atack on an NTRU Private key

Posted by Elena Kirshanova on Stack Overflow See other posts from Stack Overflow or by Elena Kirshanova
Published on 2010-05-02T18:15:33Z Indexed on 2010/05/02 18:17 UTC
Read the original article Hit count: 597

Filed under:
|
|

Hello everyone. I was wondering if anyone could tell me how to represent the enumeration of vectors of privite key f in a Meet-In-the-Middle Attack on an NTRU Private key. I can not understand the example, given here http://securityinnovation.com/cryptolab/pdf/NTRUTech004v2.pdf I'll be very thankful if anyone could show an example in detail.

© Stack Overflow or respective owner

Related posts about ntruencrypt

Related posts about attack