Provably weak instances of ring-LWE revisited
From MaRDI portal
Publication:2820481
Recommendations
Cited in
(19)- How (not) to instantiate ring-LWE
- Provably weak instances of Ring-LWE
- Weak instances of PLWE
- Security considerations for Galois non-dual RLWE families
- A Subfield Lattice Attack on Overstretched NTRU Assumptions
- RLWE/PLWE equivalence for the maximal totally real subextension of the \(2^rpq\)-th cyclotomic field
- On the ring-LWE and polynomial-LWE problems
- On error distributions in ring-based LWE
- Private conjunctive query over encrypted data
- Error analysis of weak poly-LWE instances
- Attacks on the Search RLWE Problem with Small Errors
- Algebraically structured LWE, revisited
- Homomorphic Encryption Standard
- A trace map attack against special ring-LWE samples
- Practical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiency
- (In)security of ring-LWE under partial key exposure
- On the feasibility of single-trace attacks on the Gaussian sampler using a CDT
- Algebraic aspects of solving ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm
- LP solutions of vectorial integer subset sums -- cryptanalysis of Galbraith's binary matrix LWE
This page was built for publication: Provably weak instances of ring-LWE revisited
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2820481)