Revisiting the expected cost of solving uSVP and applications to LWE

From MaRDI portal
Publication:2412877

DOI10.1007/978-3-319-70694-8_11zbMath1420.94034OpenAlexW2768572961MaRDI QIDQ2412877

Martin R. Albrecht, Florian Göpfert, Thomas Wunderer, Fernando Virdia

Publication date: 6 April 2018

Full work available at URL: https://doi.org/10.1007/978-3-319-70694-8_11




Related Items

Lattice reduction with approximate enumeration oracles. Practical algorithms and concrete performanceA trace map attack against special ring-LWE samplesShortest vectors in lattices of Bai-Galbraith's embedding attack on the LWR problemHomomorphic Encryption StandardSolving the search-LWE problem over projected latticesAn extension of Kannan's embedding for solving ring-based LWE problemsAttacking ECDSA leaking discrete bits with a more efficient lattice\(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryptionPredicting the concrete security of LWE against the dual attack using binary searchComparison analysis of Ding's RLWE-based key exchange protocol and NewHope variantsNTRU Fatigue: How Stretched is Overstretched?Generalized attack on ECDSA: known bits in arbitrary positionsJust how hard are rotations of \(\mathbb{Z}^n\)? Algorithms and cryptography with the simplest latticeA key-recovery attack against Mitaka in the \(t\)-probing modelRevisiting lower dimension lattice attacks on NTRUEHNP strikes back: analyzing SM2 implementationsRevisiting the Sparsification Technique in Kannan’s Embedding Attack on LWEHandle the traces: revisiting the attack on ECDSA with EHNPFast blind rotation for bootstrapping FHEsRevisiting security estimation for LWE with hints from a geometric perspectiveUnnamed ItemHILA5: on reliability, reconciliation, and error correction for Ring LWE encryptionLearning strikes again: the case of the DRS signature scheme(One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemesOn bounded distance decoding with predicate: breaking the ``lattice barrier for the hidden number problemOn the success probability of solving unique SVP via BKZShorter lattice-based zero-knowledge proofs via one-time commitmentsFaster enumeration-based lattice reduction: root Hermite factor \(k^{1/(2k)}\) time \(k^{k/8+o(k)}\)LWE with side information: attacks and concrete security estimationRevisiting orthogonal lattice attacks on approximate common divisor problems