Provably weak instances of ring-LWE revisited
From MaRDI portal
Publication:2820481
DOI10.1007/978-3-662-49890-3_6zbMATH Open1347.94025OpenAlexW2465263483MaRDI QIDQ2820481FDOQ2820481
Authors: Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
Publication date: 9 September 2016
Published in: Advances in Cryptology – EUROCRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://biblio.ugent.be/publication/7162559
Recommendations
Cited In (19)
- Attacks on the Search RLWE Problem with Small Errors
- Algebraic aspects of solving ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm
- Practical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiency
- On the ring-LWE and polynomial-LWE problems
- RLWE/PLWE equivalence for the maximal totally real subextension of the \(2^rpq\)-th cyclotomic field
- Homomorphic Encryption Standard
- How (not) to instantiate ring-LWE
- A trace map attack against special ring-LWE samples
- Algebraically structured LWE, revisited
- Private conjunctive query over encrypted data
- On the feasibility of single-trace attacks on the Gaussian sampler using a CDT
- Provably weak instances of Ring-LWE
- Weak instances of PLWE
- A Subfield Lattice Attack on Overstretched NTRU Assumptions
- LP solutions of vectorial integer subset sums -- cryptanalysis of Galbraith's binary matrix LWE
- Error analysis of weak poly-LWE instances
- (In)security of ring-LWE under partial key exposure
- On error distributions in ring-based LWE
- Security considerations for Galois non-dual RLWE families
This page was built for publication: Provably weak instances of ring-LWE revisited
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2820481)