{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:42:59Z","timestamp":1743000179499,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031823794"},{"type":"electronic","value":"9783031823800"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-82380-0_11","type":"book-chapter","created":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T10:16:15Z","timestamp":1739873775000},"page":"314-329","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards Message Recovery in\u00a0NTRU Encryption with\u00a0Auxiliary Data"],"prefix":"10.1007","author":[{"given":"Marios","family":"Adamoudis","sequence":"first","affiliation":[]},{"given":"Konstantinos A.","family":"Draziotis","sequence":"additional","affiliation":[]},{"given":"Eirini","family":"Poimenidou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,19]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Adamoudis, M., Draziotis, K.A., Poulakis, D.: Enhancing a DSA attack. In: CAI 2019, pp. 13\u201325. LNCS, vol. 11545. Springer (2019)","DOI":"10.1007\/978-3-030-21363-3_2"},{"key":"11_CR2","unstructured":"Abdel, K., Amr, Y.: A scan-based side channel attack on the NTRUEncrypt cryptosystem. In: 7th International Conference on Availability, Reliability and Security (2012)"},{"key":"11_CR3","doi-asserted-by":"publisher","unstructured":"Adamoudis, M., Draziotis, K.A.: Message recovery attack on NTRU using a lattice independent from the public key (2023, to appear in Advances in Mathematics of Communications (Amer. Inst. of Math. Sciences)). https:\/\/doi.org\/10.3934\/amc.2023040","DOI":"10.3934\/amc.2023040"},{"key":"11_CR4","doi-asserted-by":"publisher","unstructured":"Albrecht, M., Bai, S., Ducas, L.: A subfield lattice attack on overstretched NTRU assumptions. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016. LNCS, vol. 9814, pp. 153\u2013178. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53018-4_6","DOI":"10.1007\/978-3-662-53018-4_6"},{"issue":"1","key":"11_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF02579403","volume":"6","author":"L Babai","year":"1986","unstructured":"Babai, L.: On Lov\u00e1sz lattice reduction and the nearest lattice point problem. Combinatorica 6(1), 1\u201313 (1986)","journal-title":"Combinatorica"},{"issue":"3","key":"11_CR6","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1515\/JMC.2009.011","volume":"3","author":"G Bourgeois","year":"2009","unstructured":"Bourgeois, G., Faug\u00e8re, J.C.: Algebraic attack on NTRU using Witt vectors and Gr\u00f6bner bases. J. Math. Cryptol. 3(3), 205\u2013214 (2009)","journal-title":"J. Math. Cryptol."},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Coppersmith, D., Shamir, A.: Lattice attacks on NTRU. In: Proceedings of the Eurocrypt. LNCS, vol. 1223. Springer (1997)","DOI":"10.1007\/3-540-69053-0_5"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Cheon, J.H., Jeong, J., Lee, C.: An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without an encoding of zero. Cryptology ePrint Archive, Report 2016\/139 (2016)","DOI":"10.1112\/S1461157016000371"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Galbraith, S.: Mathematics of Public key Cryptography, Cambridge University Press (2012)","DOI":"10.1017\/CBO9781139012843"},{"key":"11_CR10","doi-asserted-by":"publisher","unstructured":"Gama, N., Nguyen, P.Q.: New chosen-ciphertext attacks on NTRU. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 89\u2013106. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-71677-8_7","DOI":"10.1007\/978-3-540-71677-8_7"},{"key":"11_CR11","doi-asserted-by":"publisher","unstructured":"Gentry, C.: Key recovery and message attacks on NTRU-composite. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 182\u2013194. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44987-6_12","DOI":"10.1007\/3-540-44987-6_12"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: a ring-based public key cryptosystem. In: Buhler, J. (eds.) Proceedings of ANTS 1998. LNCS, vol. 1423, pp. 267\u2013288 (1998)","DOI":"10.1007\/BFb0054868"},{"key":"11_CR13","doi-asserted-by":"publisher","unstructured":"Howgrave-Graham, N.: A hybrid lattice-reduction and meet-in-the-middle attack against NTRU. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 150\u2013169. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74143-5_9","DOI":"10.1007\/978-3-540-74143-5_9"},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1023\/A:1011214926272","volume":"23","author":"NA Howgrave-Graham","year":"2001","unstructured":"Howgrave-Graham, N.A., Smart, N.P.: Lattice attacks on digital signature schemes. Des. Codes Cryptogr. 23, 283\u2013290 (2001)","journal-title":"Des. Codes Cryptogr."},{"key":"11_CR15","doi-asserted-by":"publisher","unstructured":"Kirchner, P., Fouque, P.A.: Revisiting lattice attacks on overstretched NTRU parameters. In: Eurocrypt 2017. LNCS, vol. 10210. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_12","DOI":"10.1007\/978-3-319-66787-4_12"},{"key":"11_CR16","unstructured":"Howgrave-Graham, N., Silverman, J.H., Whyte, W.: Meet-in-the-middle Attack on an NTRU private key, Technical report, NTRU Cryptosystems, July 2006. Report 04. http:\/\/www.ntru.com"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Kirshanova, E., May, A., Nowakowsk, J.: New NTRU Records with. Improved Lattice Bases. eprint: 2023\/582","DOI":"10.1007\/978-3-031-40003-2_7"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Advances in Cryptology \u2014 CRYPTO 1996. Springer, Heidelberg (2001)","DOI":"10.1007\/3-540-68697-5_9"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology \u2014 CRYPTO 1999. Lecture Notes in Computer Science, vol. 1666. Springer, Heidelberg (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"11_CR20","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks, Springer New York (2007). https:\/\/link.springer.com\/book\/10.1007\/978-0-387-38162-6"},{"key":"11_CR21","unstructured":"May, A.: Cryptanalysis of NTRU (preprint) (1999). http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.41.3484"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"May, A., Nowakowski, J.: Too Many Hints \u2013 When LLL Breaks LWE (2024). https:\/\/eprint.iacr.org\/2023\/777.pdf","DOI":"10.1007\/978-981-99-8730-6_4"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Micciancio, D., Voulgaris, P.: A deterministic single exponential time algorithm for most lattice problems based on Voronoi cell computations. In: Proceedings of STOC, pp. 351\u2013358. ACM (2010)","DOI":"10.1145\/1806689.1806739"},{"key":"11_CR24","unstructured":"Mol, P., Yung, M.: Recovering NTRU secret key from inversion oracles. In: PKC 2008 (2008). https:\/\/iacr.org\/archive\/pkc2008\/49390018\/49390018.pdf"},{"key":"11_CR25","unstructured":"NIST, 3rd round candidate announcement. https:\/\/csrc.nist.gov\/news\/2020\/pqc-third-round-candidate-announcement. Accessed 1 Jan 2022"},{"key":"11_CR26","unstructured":"Nguyen, P.Q.: Boosting the hybrid attack on NTRU: torus LSH, permuted HNF and boxed sphere. In: Third PQC Standardization Conference (2021)"},{"key":"11_CR27","doi-asserted-by":"publisher","unstructured":"Paterson, K.G., Villanueva-Polanco, R.: Cold boot attacks on NTRU. In: Patra, A., Smart, N.P. (eds.) INDOCRYPT 2017. LNCS, vol. 10698, pp. 107\u2013125. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-71667-1_6","DOI":"10.1007\/978-3-319-71667-1_6"},{"key":"11_CR28","doi-asserted-by":"publisher","unstructured":"Poimenidou, E., Adamoudis, M., Draziotis, K.A., Tsichlas, K.: Message Recovery Attack in NTRU through VFK Lattices. Preprint. https:\/\/doi.org\/10.48550\/arXiv.2311.17022","DOI":"10.48550\/arXiv.2311.17022"},{"key":"11_CR29","unstructured":"Sage Mathematics Software, The Sage Development Team. http:\/\/www.sagemath.org"},{"key":"11_CR30","unstructured":"Scott Edwards, GoldBug Crypto Messenger (2018). https:\/\/compendio.github.io\/goldbug-manual\/"},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: 35th Annual Symposium on Foundations of Computer Science, Santa Fe, New Mexico, USA, 20\u201322 November 1994, pp. 124\u2013134. IEEE Computer Society (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"key":"11_CR32","unstructured":"Silverman, J.H.: Dimension-reduced lattices, zero-forced lattices, and the NTRU public key cryptosystem. Technical report 13, Version 1, NTRU Cryptosystems (1999)"},{"key":"11_CR33","doi-asserted-by":"crossref","unstructured":"Silverman, H., Smart, N.P., Vercauteren, F.: An algebraic approach to NTRU ($$q = 2n$$) via Witt vectors and overdetermined systems of non linear equations. In: Security in Communication Networks \u2013 SCN 2004. LNCS, vol. 3352, pp. 278\u2013298. Springer (2005)","DOI":"10.1007\/978-3-540-30598-9_20"},{"key":"11_CR34","unstructured":"https:\/\/www.openssh.com\/txt\/release-9.0"},{"key":"11_CR35","unstructured":"https:\/\/www.wolfssl.com\/products\/wolfssl\/"}],"container-title":["Lecture Notes in Computer Science","Number-Theoretic Methods in Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-82380-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T10:16:25Z","timestamp":1739873785000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-82380-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031823794","9783031823800"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-82380-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"19 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NuTMiC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Number-Theoretic Methods in Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Szczecin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"numtmic2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nutmic2024.usz.edu.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}