Revisiting the expected cost of solving uSVP and applications to LWE
From MaRDI portal
Publication:2412877
DOI10.1007/978-3-319-70694-8_11zbMath1420.94034OpenAlexW2768572961MaRDI QIDQ2412877
Martin R. Albrecht, Florian Göpfert, Thomas Wunderer, Fernando Virdia
Publication date: 6 April 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-70694-8_11
Related Items
Lattice reduction with approximate enumeration oracles. Practical algorithms and concrete performance ⋮ A trace map attack against special ring-LWE samples ⋮ Shortest vectors in lattices of Bai-Galbraith's embedding attack on the LWR problem ⋮ Homomorphic Encryption Standard ⋮ Solving the search-LWE problem over projected lattices ⋮ An extension of Kannan's embedding for solving ring-based LWE problems ⋮ Attacking ECDSA leaking discrete bits with a more efficient lattice ⋮ \(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryption ⋮ Predicting the concrete security of LWE against the dual attack using binary search ⋮ Comparison analysis of Ding's RLWE-based key exchange protocol and NewHope variants ⋮ NTRU Fatigue: How Stretched is Overstretched? ⋮ Generalized attack on ECDSA: known bits in arbitrary positions ⋮ Just how hard are rotations of \(\mathbb{Z}^n\)? Algorithms and cryptography with the simplest lattice ⋮ A key-recovery attack against Mitaka in the \(t\)-probing model ⋮ Revisiting lower dimension lattice attacks on NTRU ⋮ EHNP strikes back: analyzing SM2 implementations ⋮ Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE ⋮ Handle the traces: revisiting the attack on ECDSA with EHNP ⋮ Fast blind rotation for bootstrapping FHEs ⋮ Revisiting security estimation for LWE with hints from a geometric perspective ⋮ Unnamed Item ⋮ HILA5: on reliability, reconciliation, and error correction for Ring LWE encryption ⋮ Learning strikes again: the case of the DRS signature scheme ⋮ (One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemes ⋮ On bounded distance decoding with predicate: breaking the ``lattice barrier for the hidden number problem ⋮ On the success probability of solving unique SVP via BKZ ⋮ Shorter lattice-based zero-knowledge proofs via one-time commitments ⋮ Faster enumeration-based lattice reduction: root Hermite factor \(k^{1/(2k)}\) time \(k^{k/8+o(k)}\) ⋮ LWE with side information: attacks and concrete security estimation ⋮ Revisiting orthogonal lattice attacks on approximate common divisor problems