First Page | Document Content | |
---|---|---|
Date: 2015-09-20 14:16:36Cryptography Post-quantum cryptography Lattice-based cryptography Homeomorphisms Homomorphic encryption Public-key cryptography Key-recovery attack NTRU RSA Ciphertext indistinguishability Ideal lattice cryptography | Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes Massimo Chenal Qiang TangAdd to Reading ListSource URL: isc2015.item.ntnu.noDownload Document from Source WebsiteFile Size: 2,11 MBShare Document on Facebook |