LWE with side information: attacks and concrete security estimation

From MaRDI portal
Publication:2096528

DOI10.1007/978-3-030-56880-1_12zbMath1504.94128OpenAlexW3013288840MaRDI QIDQ2096528

Léo Ducas, Mélissa Rossi, Huijing Gong, Dana Dachman-Soled

Publication date: 9 November 2022

Full work available at URL: https://doi.org/10.1007/978-3-030-56880-1_12




Related Items (24)

SoK: how (not) to design and implement post-quantum cryptographySolving the search-LWE problem over projected latticesHow to find ternary LWE keys using locality sensitive hashingVandermonde meets Regev: public key encryption schemes based on partial Vandermonde problemsInformation-set decoding with hintsMultitarget Decryption Failure Attacks and Their Application to Saber and KyberNTRU Fatigue: How Stretched is Overstretched?Sieve algorithms for some orthogonal integer latticesImproved power analysis attacks on FalconGeneralized attack on ECDSA: known bits in arbitrary positionsJust how hard are rotations of \(\mathbb{Z}^n\)? Algorithms and cryptography with the simplest latticeA key-recovery attack against Mitaka in the \(t\)-probing modelS-semantics -- an exampleEHNP strikes back: analyzing SM2 implementationsHandle the traces: revisiting the attack on ECDSA with EHNPPartial key exposure attacks on BIKE, Rainbow and NTRU\textsc{Hawk}: module LIP makes lattice signatures fast, compact and simpleBLOOM: bimodal lattice one-out-of-many proofs and applicationsEstimating the hidden overheads in the BDGL lattice sieving algorithmRevisiting security estimation for LWE with hints from a geometric perspectiveOn bounded distance decoding with predicate: breaking the ``lattice barrier for the hidden number problemOn the success probability of solving unique SVP via BKZShorter lattice-based zero-knowledge proofs via one-time commitmentsLWE with side information: attacks and concrete security estimation


Uses Software


Cites Work




This page was built for publication: LWE with side information: attacks and concrete security estimation