{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:36:46Z","timestamp":1725493006567},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540405153"},{"type":"electronic","value":"9783540450672"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-45067-x_24","type":"book-chapter","created":{"date-parts":[[2007,10,24]],"date-time":"2007-10-24T20:29:51Z","timestamp":1193257791000},"page":"274-284","source":"Crossref","is-referenced-by-count":5,"title":["Key Recovery Attacks on NTRU without Ciphertext Validation Routine"],"prefix":"10.1007","author":[{"given":"Daewan","family":"Han","sequence":"first","affiliation":[]},{"given":"Jin","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Jae Woo","family":"Han","sequence":"additional","affiliation":[]},{"given":"Daesung","family":"Kwon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,18]]},"reference":[{"unstructured":"Consortium for Efficient Embedded Security, Efficient embedded security standards #1: Implementation aspects of NTRUEncrypt and NTRUSign. Draft version 5. Available from http:\/\/www.ceesstandards.org.","key":"24_CR1"},{"unstructured":"Daewan Han, Jin Hong, Jae Woo Han, and Daesung Kwon, Key recovery attacks on NTRU without ciphertext validation routine. IACR ePrint 2002\/188. Available from http:\/\/eprint.iacr.org.","key":"24_CR2"},{"key":"24_CR3","series-title":"Lect Notes Comput Sci","volume-title":"Proc. of ANTS III","author":"J. Hoffstein","year":"1998","unstructured":"Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman, NTRU: A ring-based public key cryptosystem. In Proc. of ANTS III, LNCS 1423. Springer-Verlag, 1998."},{"unstructured":"Jeffrey Hoffstein and Joseph Silverman, Optimizations for NTRU. In Public-Key Cryptogrphy and Computational Number Theory. DeGruyter, 2002. Available from [10].","key":"24_CR4"},{"unstructured":"Jeffrey Hoffstein and Joseph H. Silverman, Reaction attacks against the NTRU public key cryptosystem. Techinal report #015, NTRU Cryptosystems. Available from [10].","key":"24_CR5"},{"unstructured":"Jeffrey Hoffstein and Joseph H. Silverman, Protecting NTRU Against Chosen Ciphertext and Reaction Attacks, Technical Report #016, NTRU Cryptosystems. Available from [10].","key":"24_CR6"},{"unstructured":"IEEE Standard P1363.1\/D4, Standard specifications for public key cryptography: Techniques based on hard problems over lattices, IEEE. Available from http:\/\/grouper.ieee.org\/group\/1363.","key":"24_CR7"},{"key":"24_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_2","volume-title":"Advances in Cryptology \u2014 CRYPTO 2000","author":"\u00c9. Jaulmes","year":"2000","unstructured":"\u00c9liane Jaulmes and Antoine Joux, A chosen-ciphertext attack against NTRU. Advances in Cryptology \u2014 CRYPTO 2000, LNCS 1880. Springer-Verlag, 2000."},{"key":"24_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_14","volume-title":"Advances in Cryptology \u2014 CRYPTO 2002","author":"P. Q. Nguyen","year":"2002","unstructured":"Phong Q. Nguyen and David Pointcheval, Analysis and improvements of NTRU encryption paddings. Advances in Cryptology \u2014 CRYPTO 2002, LNCS 2442. Springer-Verlag, 2002."},{"unstructured":"NTRU Cryptosystems, Technical reports. Available from http:\/\/www.ntru.com.","key":"24_CR10"},{"unstructured":"NTRU Cryptosystems, The NTRU public key cryptosystem \u2014 A tutorial. Available from http:\/\/www.ntru.com.","key":"24_CR11"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45067-X_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,17]],"date-time":"2019-01-17T11:55:16Z","timestamp":1547726116000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45067-X_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540405153","9783540450672"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-45067-x_24","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}