A key encapsulation mechanism for NTRU

5Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this article we present a key encapsulation mechanism (KEM) for NTRU. The KEM is more efficient than a naive approach based on NAEP and resistant against the decryption failures that may occur when using NTRU. We also introduce plaintext awareness for KEMs and use it to tighten a security result by Dent. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Stam, M. (2005). A key encapsulation mechanism for NTRU. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3796 LNCS, pp. 410–427). https://doi.org/10.1007/11586821_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free