PDF | In this report we describe a meet-in-the-middle attack on an NTRU private key. If the private key is chosen from a sample space with 2 M elements,.
確定! 回上一頁