SummaryIntroductionNTRU CryptographyNTRUSign and CountermeasuresOur ResultsLeakage model: Parallelepipeds and ZonotopesSolving the Learning ProblemsThe New Attack In Practice