| Publication | Date of Publication | Type |
|---|
| Wagner's algorithm provably runs in subexponential time for \(\mathrm{SIS}^\infty \) | 2026-02-04 | Paper |
Accurate score prediction for Dual-Sieve attacks Journal of Cryptology | 2025-12-16 | Paper |
| Asymptotics and improvements of sieving for codes | 2024-11-13 | Paper |
Smoothing codes and lattices: systematic study and new bounds IEEE Transactions on Information Theory | 2024-07-19 | Paper |
Provable lattice reduction of $$\mathbb {Z}^n$$ with blocksize n/2 Designs, Codes and Cryptography | 2024-04-22 | Paper |
Genus distribution of random $q$-ary lattices Banach Center Publications | 2024-03-15 | Paper |
Does the dual-sieve attack on learning with errors even work? Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Finding short integer solutions when the modulus is small Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Hull attacks on the lattice isomorphism problem Lecture Notes in Computer Science | 2023-11-24 | Paper |
\textsc{Hawk}: module LIP makes lattice signatures fast, compact and simple Advances in Cryptology – ASIACRYPT 2022 | 2023-08-21 | Paper |
Estimating the hidden overheads in the BDGL lattice sieving algorithm Post-Quantum Cryptography | 2023-07-07 | Paper |
NTRU Fatigue: How Stretched is Overstretched? Lecture Notes in Computer Science | 2023-05-26 | Paper |
Mildly Short Vectors in Cyclotomic Ideal Lattices in Quantum Polynomial Time Journal of the ACM | 2022-12-08 | Paper |
| LWE with side information: attacks and concrete security estimation | 2022-11-09 | Paper |
| Random self-reducibility of ideal-SVP via Arakelov random walks | 2022-11-09 | Paper |
| On the lattice isomorphism problem, quadratic forms, remarkable lattices, and cryptography | 2022-08-30 | Paper |
An Algorithmic Reduction Theory for Binary Codes: LLL and More IEEE Transactions on Information Theory | 2022-07-13 | Paper |
| Integral matrix Gram root and lattice Gaussian sampling without floats | 2022-03-23 | Paper |
| On the quantum complexity of the continuous hidden subgroup problem | 2022-03-23 | Paper |
| Lattice attacks on NTRU and LWE: a history of refinements | 2022-02-25 | Paper |
| Advanced lattice sieving on GPUs, with tensor cores | 2021-12-08 | Paper |
| The randomized slicer for CVPP: sharper, faster, smaller, batchier | 2021-12-01 | Paper |
Learning strikes again: the case of the DRS signature scheme Journal of Cryptology | 2021-06-16 | Paper |
| On the shortness of vectors to be found by the ideal-SVP quantum algorithm | 2020-05-20 | Paper |
| The general sieve kernel and new records in lattice reduction | 2020-02-06 | Paper |
Polynomial time bounded distance decoding near Minkowski's bound in discrete logarithm lattices Designs, Codes and Cryptography | 2019-06-27 | Paper |
Learning strikes again: the case of the DRS signature scheme Lecture Notes in Computer Science | 2019-01-23 | Paper |
| On the statistical leak of the GGH13 multilinear map and some variants | 2018-12-20 | Paper |
| Large FHE gates from tensored homomorphic accumulator | 2018-07-17 | Paper |
New directions in nearest neighbor searching with applications to lattice sieving Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms | 2018-07-16 | Paper |
| Shortest vector from lattice sieving: a few dimensions for free | 2018-07-09 | Paper |
| Attacks on the AJPS Mersenne based cryptosystem | 2018-06-22 | Paper |
| Hash proof systems over lattices revisited | 2018-05-29 | Paper |
| Second order statistical behavior of LLL and BKZ | 2018-04-26 | Paper |
The closest vector problem in tensored root lattices of type A and in their duals Designs, Codes and Cryptography | 2018-01-26 | Paper |
| scientific article; zbMATH DE number 6823399 (Why is no real title available?) | 2018-01-09 | Paper |
Short Stickelberger class relations and application to Ideal-SVP Lecture Notes in Computer Science | 2017-06-13 | Paper |
Fast Fourier orthogonalization Proceedings of the ACM on International Symposium on Symbolic and Algebraic Computation | 2017-05-10 | Paper |
A Subfield Lattice Attack on Overstretched NTRU Assumptions Advances in Cryptology – CRYPTO 2016 | 2016-11-30 | Paper |
Sanitization of FHE ciphertexts Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
Recovering short generators of principal ideals in cyclotomic rings Advances in Cryptology – EUROCRYPT 2016 | 2016-07-15 | Paper |
FHEW: bootstrapping homomorphic encryption in less than a second Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
Enhanced lattice-based signatures on reconfigurable hardware Advanced Information Systems Engineering | 2015-07-21 | Paper |
Efficient identity-based encryption over NTRU lattices Lecture Notes in Computer Science | 2015-01-06 | Paper |
Improved short lattice signatures in the standard model Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Lattice signatures and bimodal Gaussians Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Faster Gaussian lattice sampling using lazy floating-point arithmetic Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Learning a zonotope and more: cryptanalysis of ntrusign countermeasures Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Ring-LWE in polynomial rings Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Anonymity from Asymmetry: New Constructions for Anonymous HIBE Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |