Gerald Bourgeois

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
We present an algebraic attack on NTRU (restricted to the case where the parameter q is a power of two) using the method of the Witt vectors proposed by Silverman, Smart and Vercauteren [17]; the latter considered only the first two bits of a Witt vector attached to the recovering of the secret key in order to reduce the problem to the resolution of an(More)
  • 1