{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T00:00:48Z","timestamp":1775692848057,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540679073","type":"print"},{"value":"9783540445982","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44598-6_2","type":"book-chapter","created":{"date-parts":[[2007,5,1]],"date-time":"2007-05-01T10:15:21Z","timestamp":1178014521000},"page":"20-35","source":"Crossref","is-referenced-by-count":44,"title":["A Chosen-Ciphertext Attack against NTRU"],"prefix":"10.1007","author":[{"given":"\u00c9liane","family":"Jaulmes","sequence":"first","affiliation":[]},{"given":"Antoine","family":"Joux","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,8,11]]},"reference":[{"key":"2_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/BFb0055718","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201998","author":"M. Bellare","year":"1998","unstructured":"Mihir Bellare, Anand Desai, David Pointcheval, and Phillip Rogaway. Relations among notions of security for public-key encryption schemes. In Hugo Krawczyk, editor, Advances in Cryptology \u2014 CRYPTO\u201998, volume 1462 of Lecture Notes in Computer Science, pages 26\u201345. Springer, 1998."},{"key":"2_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/BFb0053428","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201994","author":"M. Bellare","year":"1994","unstructured":"Mihir Bellare and Phillip Rogaway. Optimal asymmetric encryption. In A. de Santis, editor, Advances in Cryptology \u2014 EUROCRYPT\u201994, volume 950 of Lecture Notes in Computer Science, pages 92\u2013111. Springer-Verlag, 1994."},{"key":"2_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1007\/3-540-69053-0_5","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201997","author":"D. Coppersmith","year":"1997","unstructured":"D. Coppersmith and A. Shamir. Lattice attacks on NTRU. In Advances in Cryptology \u2014 EUROCRYPT\u201997, volume 1233 of Lecture Notes in Computer Science, pages 52\u201361, 1997."},{"key":"2_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1007\/3-540-48405-1_34","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201999","author":"E. Fujisaki","year":"1999","unstructured":"Eiichiro Fujisaki and Tatsuaki Okamoto. Secure integration of asymmetric and symmetric encryption schemes. In Michael Wiener, editor, Advances in Cryptology \u2014 CRYPTO\u201999, volume 1666 of Lecture Notes in Computer Science, pages 537\u2013554. Springer-Verlag, 1999."},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/S0020-0190(98)00160-4","volume":"68","author":"H. Gilbert","year":"1998","unstructured":"H. Gilbert, D. Gupta, A.M. Odlyzko, and J.-J. Quisquater. Attacks on shamir\u2019s \u2018rsa for paranoids\u2019. Information Processing Letters, 68:197\u2013199, 1998. http:\/\/www.research.att.com\/amo\/doc\/recent.html .","journal-title":"Information Processing Letters"},{"key":"2_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/978-3-540-47942-0_2","volume-title":"ICICS\u201999","author":"C. Hall","year":"1999","unstructured":"Chris Hall, Ian Goldberg, and Bruce Schneier. Reaction attacks against several public-key cryptosystems. In G. Goos, J. Hartmanis, and J. van Leeuwen, editors, ICICS\u201999, volume 1726 of Lecture Notes in Computer Science, pages 2\u201312. Springer-Verlag, 1999."},{"key":"2_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/BFb0054868","volume-title":"ANTS\u20193","author":"J. Hoffstein","year":"1998","unstructured":"Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman. NTRU: A ring based public key cryptosystem. In ANTS\u20193, volume 1423 of Lecture Notes in Computer Science, pages 267\u2013288. Springer Verlag, 1998."},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Jeffrey Hoffstein and Joseph H. Silverman. Reaction attacks against the NTRU public key cryptosystem. Technical Report 15, NTRU Cryptosystems, August 1999.","DOI":"10.1007\/BFb0054868"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"M. Joye and J.-J. Quisquater. On the importance of securing your bins: the garbage-man-in-the-middle attack. 4th ACM Conf. Computer Comm. Security, pages 135\u2013141, 1997.","DOI":"10.1145\/266420.266449"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/BF01457454","volume":"261","author":"A.K. Lenstra","year":"1982","unstructured":"A.K. Lenstra, H.W. Lenstra, and L. Lov\u00e1sz. Factoring polynomials with polynomial coefficients. Math. Annalen, 261:515\u2013534, 1982.","journal-title":"Math. Annalen"},{"key":"2_CR11","unstructured":"Joseph H. Silverman. Plaintext awareness and the NTRU PKCS. Technical Report 7, NTRU Cryptosystems, July 1998."},{"key":"2_CR12","unstructured":"Joseph H. Silverman. Estimated breaking times for NTRU lattices. Technical Report 12, NTRU Cryptosystems, March 1999."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO 2000"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44598-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T16:34:10Z","timestamp":1556382850000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44598-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540679073","9783540445982"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-44598-6_2","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2000]]}}}