Meet-in-the-Middle Atack on an NTRU Private key
Posted
by Elena Kirshanova
on Stack Overflow
See other posts from Stack Overflow
or by Elena Kirshanova
Published on 2010-05-02T18:15:33Z
Indexed on
2010/05/02
18:17 UTC
Read the original article
Hit count: 595
Hello everyone. I was wondering if anyone could tell me how to represent the enumeration of vectors of privite key f in a Meet-In-the-Middle Attack on an NTRU Private key. I can not understand the example, given here http://securityinnovation.com/cryptolab/pdf/NTRUTech004v2.pdf I'll be very thankful if anyone could show an example in detail.
© Stack Overflow or respective owner