Cryptology ePrint Archive: Report 2002/188

Available versions in chronological order


Chosen-Ciphertext Attacks on Optimized NTRU
Jin Hong and Jae Woo Han and Daesung Kwon and Daewan Han

Key recovery attacks on NTRU without ciphertext validation routine
Daewan Han and Jin Hong and Jae Woo Han and Daesung Kwon


[ Cryptology ePrint archive ]