The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Neste artigo, apresentamos uma análise de falhas do criptossistema de chave pública NTRU original. O modelo de falha no qual analisamos a cifra é aquele em que se presume que o invasor seja capaz de falhar um pequeno número de coeficientes da entrada polinomial (ou saída) da segunda etapa do processo de descriptografia, mas não pode controlar o exato localização das falhas injetadas. Para esta instanciação original específica do sistema de criptografia NTRU com parâmetros (N,p,q), nosso ataque é bem-sucedido com probabilidade≈
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copiar
Abdel Alim KAMAL, Amr YOUSSEF, "Fault Analysis of the NTRUEncrypt Cryptosystem" in IEICE TRANSACTIONS on Fundamentals,
vol. E94-A, no. 4, pp. 1156-1158, April 2011, doi: 10.1587/transfun.E94.A.1156.
Abstract: In this paper, we present a fault analysis of the original NTRU public key cryptosystem. The fault model in which we analyze the cipher is the one in which the attacker is assumed to be able to fault a small number of coefficients of the polynomial input to (or output from) the second step of the decryption process but cannot control the exact location of injected faults. For this specific original instantiation of the NTRU encryption system with parameters (N,p,q), our attack succeeds with probability≈
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E94.A.1156/_p
Copiar
@ARTICLE{e94-a_4_1156,
author={Abdel Alim KAMAL, Amr YOUSSEF, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Fault Analysis of the NTRUEncrypt Cryptosystem},
year={2011},
volume={E94-A},
number={4},
pages={1156-1158},
abstract={In this paper, we present a fault analysis of the original NTRU public key cryptosystem. The fault model in which we analyze the cipher is the one in which the attacker is assumed to be able to fault a small number of coefficients of the polynomial input to (or output from) the second step of the decryption process but cannot control the exact location of injected faults. For this specific original instantiation of the NTRU encryption system with parameters (N,p,q), our attack succeeds with probability≈
keywords={},
doi={10.1587/transfun.E94.A.1156},
ISSN={1745-1337},
month={April},}
Copiar
TY - JOUR
TI - Fault Analysis of the NTRUEncrypt Cryptosystem
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1156
EP - 1158
AU - Abdel Alim KAMAL
AU - Amr YOUSSEF
PY - 2011
DO - 10.1587/transfun.E94.A.1156
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E94-A
IS - 4
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - April 2011
AB - In this paper, we present a fault analysis of the original NTRU public key cryptosystem. The fault model in which we analyze the cipher is the one in which the attacker is assumed to be able to fault a small number of coefficients of the polynomial input to (or output from) the second step of the decryption process but cannot control the exact location of injected faults. For this specific original instantiation of the NTRU encryption system with parameters (N,p,q), our attack succeeds with probability≈
ER -