{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T02:50:55Z","timestamp":1725504655569},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540784395"},{"type":"electronic","value":"9783540784401"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-78440-1_2","type":"book-chapter","created":{"date-parts":[[2008,2,26]],"date-time":"2008-02-26T10:53:32Z","timestamp":1204023212000},"page":"18-36","source":"Crossref","is-referenced-by-count":6,"title":["Recovering NTRU Secret Key from Inversion Oracles"],"prefix":"10.1007","author":[{"given":"Petros","family":"Mol","sequence":"first","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"EESS: Consortium for Efficient Embedded Security. Efficient Embedded Security Standards #1: Implementation Aspects of NTRU and NSS, draft version 3.0 edition (July 2001)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: ACM Conference on Computer and Communications Security, pp. 62\u201373 (1993)","DOI":"10.1145\/168588.168596"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/BFb0054117","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"D. Boneh","year":"1998","unstructured":"Boneh, D., Venkatesan, R.: Breaking RSA May Not Be Equivalent to Factoring. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 59\u201371. Springer, Heidelberg (1998)"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1007\/3-540-69053-0_5","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D. Coppersmith","year":"1997","unstructured":"Coppersmith, D., Shamir, A.: Lattice Attacks on NTRU. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 52\u201361. Springer, Heidelberg (1997)"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-540-71677-8_7","volume-title":"Public Key Cryptography \u2013 PKC 2007","author":"N. Gama","year":"2007","unstructured":"Gama, N., Nguyen, P.Q.: New Chosen-Ciphertext Attacks on NTRU. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol.\u00a04450, pp. 89\u2013106. Springer, Heidelberg (2007)"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/3-540-44987-6_12","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"C. Gentry","year":"2001","unstructured":"Gentry, C.: Key Recovery and Message Attacks on NTRU-Composite. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 182\u2013194. Springer, Heidelberg (2001)"},{"key":"2_CR7","unstructured":"Hoffstein, J., Howgrave-Graham, N., Pipher, J., Silverman, J.H., Whyte, W.: Hybrid Lattice Reduction and Meet in the Middle Resistant Parameter Selection for NTRUEncrypt, http:\/\/grouper.ieee.org\/groups\/1363\/lattPK\/submissions\/ChoosingNewParameters.pdf"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/BFb0054868","volume-title":"Algorithmic Number Theory","author":"J. Hoffstein","year":"1998","unstructured":"Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: A Ring-Based Public Key Cryptosystem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol.\u00a01423, pp. 267\u2013288. Springer, Heidelberg (1998)"},{"key":"2_CR9","unstructured":"Hoffstein, J., Silverman, J.H.: Protecting NTRU Against Chosen Ciphertext and Reaction Attacks. Technical report, NTRU Cryptosystems (2000), http:\/\/citeseer.ist.psu.edu\/hoffstein00protecting.html"},{"key":"2_CR10","unstructured":"Hoffstein, J., Silverman, J.H.: Reaction Attacks Against the NTRU Public Key Cryptosystem. Technical Report, NTRU Cryptosystems, Report #015, version 2 (June 2000), http:\/\/citeseer.ist.psu.edu\/hoffstein00reaction.html"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-540-74143-5_9","volume-title":"Advances in Cryptology - CRYPTO 2007","author":"N. Howgrave-Graham","year":"2007","unstructured":"Howgrave-Graham, N.: A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.\u00a04622, pp. 150\u2013169. Springer, Heidelberg (2007)"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1007\/978-3-540-45146-4_14","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"N. Howgrave-Graham","year":"2003","unstructured":"Howgrave-Graham, N., Nguyen, P.Q., Pointcheval, D., Proos, J., Silverman, J.H., Singer, A., Whyte, W.: The Impact of Decryption Failures on the Security of NTRU Encryption. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 226\u2013246. Springer, Heidelberg (2003)"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Howgrave-Graham, N., Silverman, J.H., Whyte, W.: Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3. Technical Report, NTRU CRYPTOSYSTEMS (2005)","DOI":"10.1007\/978-3-540-30574-3_10"},{"key":"2_CR14","unstructured":"Hong, J., Han, J., Kwon, D., Han, D.: Chosen-Ciphertext Attacks on Optimized NTRU. Cryptology ePrint Archive: Report 2002\/188 (2002)"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/3-540-44598-6_2","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"\u00c9. Jaulmes","year":"2000","unstructured":"Jaulmes, \u00c9., Joux, A.: A Chosen-Ciphertext Attack against NTRU. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 20\u201335. Springer, Heidelberg (2000)"},{"key":"2_CR16","unstructured":"Hoffstein, J., Silverman, J.: Optimizations for NTRU. Technical report, NTRU Cryptosystems (June 2000), http:\/\/citeseer.ist.psu.edu\/693057.html"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/3-540-36288-6_5","volume-title":"Public Key Cryptography - PKC 2003","author":"M. N\u00e4slund","year":"2002","unstructured":"N\u00e4slund, M., Shparlinski, I., Whyte, W.: On the Bit Security of NTRUEncrypt. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 62\u201370. Springer, Heidelberg (2002)"},{"key":"2_CR18","unstructured":"May, A.: Cryptanalysis of NTRU-107 (1999), http:\/\/www.informatik.tu-darmstadt.de\/KP\/publications\/01\/CryptanalysisOfNTRU.ps"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/3-540-45708-9_14","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"P.Q. Nguyen","year":"2002","unstructured":"Nguyen, P.Q., Pointcheval, D.: Analysis and Improvements of NTRU Encryption Paddings.. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 210\u2013225. Springer, Heidelberg (2002)"},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/11935230_17","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2006","author":"P. Paillier","year":"2006","unstructured":"Paillier, P., Villar, J.L.: Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption.. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.\u00a04284, pp. 252\u2013266. Springer, Heidelberg (2006)"},{"key":"2_CR21","unstructured":"Rabin, M.O.: Digital Signatures and Public-Key Functions as Intractable as Factorization. Technical report, Cambridge (1979)"}],"container-title":["Lecture Notes in Computer Science","Public Key Cryptography \u2013 PKC 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78440-1_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:09:07Z","timestamp":1619521747000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-78440-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540784395","9783540784401"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78440-1_2","relation":{},"subject":[]}}