An attacker produces a sequence of encrypted messages E, each of which has a distinct probability, however small, of decrypting into a valid message and also a probability of decrypting into an invalid message. The smallest modification that an attacker can make to the cipher-text and can still decrypt it correctly, gives information about the private key used to encrypt the message. In this paper we assume that the attacker knows or the gets hold of intermediate text which arises during the process of decryption. © 2011 Springer-Verlag.
CITATION STYLE
Nayak, R., Pradhan, J., & Sastry, C. V. (2011). Reaction attacks in the matrix scheme of NTRU cryptosystem. In Communications in Computer and Information Science (Vol. 147 CCIS, pp. 27–32). https://doi.org/10.1007/978-3-642-20573-6_5
Mendeley helps you to discover research relevant for your work.