LWE without modular reduction and improved side-channel attacks against BLISS
From MaRDI portal
Publication:1633471
DOI10.1007/978-3-030-03326-2_17zbMath1446.94109OpenAlexW2898218073MaRDI QIDQ1633471
Thomas Espitau, Claire Delaplace, Jonathan Bootle, Mehdi Tibouchi, Pierre-Alain Fouque
Publication date: 20 December 2018
Full work available at URL: https://doi.org/10.1007/978-3-030-03326-2_17
Related Items (7)
Integer LWE with non-subgaussian error and related attacks ⋮ Improved power analysis attacks on Falcon ⋮ Multi-authority ABE from lattices without random oracles ⋮ A framework for practical anonymous credentials from lattices ⋮ One bit is all it takes: a devastating timing attack on BLISS's non-constant time sign flips ⋮ Key recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU lattices ⋮ LWE with side information: attacks and concrete security estimation
Cites Work
- Unnamed Item
- User-friendly tail bounds for sums of random matrices
- An inequality for \(L_ p\)-norms with respect to the multivariate normal distribution
- Robustly reusable fuzzy extractor from standard assumptions
- Reusable fuzzy extractor from LWE
- Reusable fuzzy extractor from the decisional Diffie-Hellman assumption
- Worst-case to average-case reductions for module lattices
- Random version of Dvoretzky's theorem in \(\ell_p^n\)
- Smallest singular value of random matrices and geometry of random polytopes
- Reusable Fuzzy Extractors for Low-Entropy Distributions
- Hardness of SIS and LWE with Small Parameters
- Computational Fuzzy Extractors
- Hardness of k-LWE and Applications in Traitor Tracing
- High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers
- Handbook of Face Recognition
- Propriétés locales des fonctions à séries de Fourier aléatoires
- An Improved Robust Fuzzy Extractor
- On Ideal Lattices and Learning with Errors over Rings
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
- Efficient Public Key Encryption Based on Ideal Lattices
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- A Toolkit for Ring-LWE Cryptography
- Circular Chosen-Ciphertext Security with Compact Ciphertexts
- Efficient, Reusable Fuzzy Extractors from LWE
- Non-malleable extractors and symmetric key cryptography from weak secrets
- Advances in Cryptology - EUROCRYPT 2004
- Quantum information and computation
- Secure Remote Authentication Using Biometric Data
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
- Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
- On lattices, learning with errors, random linear codes, and cryptography
This page was built for publication: LWE without modular reduction and improved side-channel attacks against BLISS