(In)security of ring-LWE under partial key exposure
From MaRDI portal
Publication:2027270
DOI10.1515/jmc-2020-0075zbMath1464.94031OpenAlexW3111258441MaRDI QIDQ2027270
Huijing Gong, Dana Dachman-Soled, Aria Shahverdi, Mukul Kulkarni
Publication date: 25 May 2021
Published in: Journal of Mathematical Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1515/jmc-2020-0075
Related Items
Breaking Goppa-based McEliece with hints ⋮ Decoding McEliece with a hint -- secret Goppa key parts reveal everything ⋮ Rounding in the rings
Uses Software
Cites Work
- Local non-malleable codes in the bounded retrieval model
- Order-LWE and the hardness of ring-LWE with entropic secrets
- Fully leakage-resilient signatures
- How (Not) to Instantiate Ring-LWE
- Practical Bootstrapping in Quasilinear Time
- Signatures Resilient to Continual Leakage on Memory and Computation
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Public-Key Encryption Schemes with Auxiliary Inputs
- On Ideal Lattices and Learning with Errors over Rings
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- A Leakage-Resilient Mode of Operation
- Signature Schemes with Bounded Leakage Resilience
- A Toolkit for Ring-LWE Cryptography
- On cryptography with auxiliary input
- On Ideal Lattices and Learning with Errors over Rings
- Lazy Modulus Switching for the BKW Algorithm on LWE
- How to leak on key updates
- Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-malleable Codes
This page was built for publication: (In)security of ring-LWE under partial key exposure