Back to Search Start Over

An efficient broadcast attack against NTRU

Authors :
Jianwei Li
Guizhen Zhu
Yanbin Pan
Mingjie Liu
Institute for Advanced Study [Tsinghua]
Tsinghua University [Beijing] (THU)
Cryptanalyse (CRYPT)
Laboratoire Franco-Chinois d'Informatique, d'Automatique et de Mathématiques Appliquées (LIAMA)
Centre de Coopération Internationale en Recherche Agronomique pour le Développement (Cirad)-Institut National de la Recherche Agronomique (INRA)-Chinese Academy of Sciences [Changchun Branch] (CAS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Institute of Automation - Chinese Academy of Sciences-Centre National de la Recherche Scientifique (CNRS)-Centre de Coopération Internationale en Recherche Agronomique pour le Développement (Cirad)-Institut National de la Recherche Agronomique (INRA)-Chinese Academy of Sciences [Changchun Branch] (CAS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Institute of Automation - Chinese Academy of Sciences-Centre National de la Recherche Scientifique (CNRS)-Inria Paris-Rocquencourt
Institut National de Recherche en Informatique et en Automatique (Inria)
Key Laboratory of Mathematics Mechanization (KLMM)
Chinese Academy of Sciences [Changchun Branch] (CAS)-Institute of Systems Science (ISS), China-Academy of Mathematics and Systems Science [Beijing]
ACM
Heung Youl Youm and Yoojae Won
Tsinghua University [Beijing]
Source :
ASIACCS 2012-7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012-7th ACM Symposium on Information, Computer and Communications Security, ACM, May 2012, Seoul, South Korea. ⟨10.1145/2414456.2414467⟩, AsiaCCS
Publication Year :
2012
Publisher :
HAL CCSD, 2012.

Abstract

The NTRU cryptosystem is the most practical scheme known to date and has drawn considerable interest, which depends on three integer parameters (N, p, q) and four sets Lf, Lg, Lr, Lm of polynomials of degree N − 1 with small integer coefficients. We choose p, q such that gcd(p, q) = 1 and p is much smaller than q, denote the ring Z[x]/(xN -- 1) by R and the multiplication in R by *.

Details

Language :
English
Database :
OpenAIRE
Journal :
ASIACCS 2012-7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012-7th ACM Symposium on Information, Computer and Communications Security, ACM, May 2012, Seoul, South Korea. ⟨10.1145/2414456.2414467⟩, AsiaCCS
Accession number :
edsair.doi.dedup.....506caeb30e08675eabe27113e91b25d1
Full Text :
https://doi.org/10.1145/2414456.2414467⟩