Better key sizes (and attacks) for LWE-based encryption
From MaRDI portal
Publication:3073715
Recommendations
- On the concrete hardness of learning with errors
- On the hardness of LWE with binary error: revisiting the hybrid lattice-reduction and meet-in-the-middle attack
- Practical analysis of key recovery attack against search-LWE problem
- On lattices, learning with errors, random linear codes, and cryptography
- On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL
Cites work
- scientific article; zbMATH DE number 1186948 (Why is no real title available?)
- scientific article; zbMATH DE number 1942427 (Why is no real title available?)
- scientific article; zbMATH DE number 1962809 (Why is no real title available?)
- scientific article; zbMATH DE number 1559544 (Why is no real title available?)
- scientific article; zbMATH DE number 1445397 (Why is no real title available?)
- A Framework for Efficient and Composable Oblivious Transfer
- A deterministic single exponential time algorithm for most lattice problems based on Voronoi cell computations
- A sieve algorithm for the shortest lattice vector problem
- An efficient and parallel Gaussian sampler for lattices
- Bonsai trees, or how to delegate a lattice basis
- Efficient lattice (H)IBE in the standard model
- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
- Faster exponential time algorithms for the shortest vector problem
- Fully homomorphic encryption using ideal lattices
- Generalized compact knapsacks, cyclic lattices, and efficient one-way functions
- Inequalities for convex bodies and polar reciprocal lattices in \(\mathbb{R}^ n\)
- Lattice basis reduction: Improved practical algorithms and solving subset sum problems
- Lattice enumeration using extreme pruning
- Lattice-based Cryptography
- Lossy trapdoor functions and their applications
- New bounds in some transference theorems in the geometry of numbers
- New lattice-based cryptographic constructions
- Noise-tolerant learning, the parity problem, and the statistical query model
- On Lovász' lattice reduction and the nearest lattice point problem
- On ideal lattices and learning with errors over rings
- On lattices, learning with errors, random linear codes, and cryptography
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Predicting Lattice Reduction
- Public-Key Cryptographic Primitives Provably as Secure as Subset Sum
- Public-key cryptosystems from the worst-case shortest vector problem
- Selecting cryptographic key sizes
- Trapdoors for hard lattices and new cryptographic constructions
Cited in
(only showing first 100 items - show all)- Parallel implementation of \textsf{BDD} enumeration for \textsf{LWE}
- Coded-BKW: solving LWE using lattice codes
- Estimation of the hardness of the learning with errors problem with a restricted number of samples
- Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE
- A new R-LWE based digital signature scheme
- Post-quantum key exchange for the Internet and the open quantum safe project
- Cryptanalysis of compact-LWE
- Secret handshakes: full dynamicity, deniability and lattice-based design
- Lattice Point Enumeration on Block Reduced Bases
- Practical FHE parameters against lattice attacks
- An optimized GHV-type HE scheme: simpler, faster, and more versatile
- scientific article; zbMATH DE number 7546039 (Why is no real title available?)
- On a dual/hybrid approach to small secret LWE. A dual/enumeration technique for learning with errors and application to security estimates of FHE schemes
- Dual lattice attacks for closest vector problems (with preprocessing)
- Preimage sampling in the higher-bit approximate setting with a non-spherical Gaussian sampler
- Analysis of error-correcting codes for lattice-based key exchange
- Solving LWR via BDD Strategy: Modulus Switching Approach
- Augmented Learning with Errors: The Untapped Potential of the Error Term
- Sieving for Shortest Vectors in Lattices Using Angular Locality-Sensitive Hashing
- Revocable hierarchical identity-based authenticated key exchange
- Towards post-quantum security for signal's X3DH handshake
- Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes
- Lattice-based key exchange on small integer solution problem
- Lattice-based cryptography: a survey
- Post-quantum forward-secure onion routing (future anonymity in today's budget)
- The geometry of lattice cryptography
- On the asymptotic complexity of solving LWE
- Secure statistical analysis using RLWE-based homomorphic encryption
- Polly cracker, revisited
- HILA5: on reliability, reconciliation, and error correction for Ring LWE encryption
- Onion ORAM: a constant bandwidth blowup oblivious RAM
- An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption
- Enhancing Goldreich, Goldwasser and Halevi's scheme with intersecting lattices
- Homomorphic Encryption Standard
- How (not) to instantiate ring-LWE
- An improved BKW algorithm for LWE with applications to cryptography and lattices
- Generalized attack on ECDSA: known bits in arbitrary positions
- Random sampling revisited: lattice enumeration with discrete pruning
- Accelerating Lattice Based Proxy Re-encryption Schemes on GPUs
- Post-quantum cryptography: state of the art
- A secure hierarchical deterministic wallet with stealth address from lattices
- The polynomial approximate common divisor problem and its application to the fully homomorphic encryption
- Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS
- LWE with side information: attacks and concrete security estimation
- Efficient integer encoding for homomorphic encryption via ring isomorphisms
- Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates
- Lattice-based certificateless encryption scheme
- Fiat-Shamir and correlation intractability from strong KDM-secure encryption
- NEV: faster and smaller NTRU encryption using vector decoding
- STP-LWE: A variant of learning with error for a flexible encryption
- Lattice-based SNARGs and their application to more efficient obfuscation
- Homomorphic AES evaluation using the modified LTV scheme
- Logarithmic-size (linkable) threshold ring signatures in the plain model
- A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack
- Provably secure password authenticated key exchange based on RLWE for the post-quantum world
- New techniques for SIDH-based NIKE
- High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers
- Too many hints -- when LLL breaks LWE
- An experimental study of Kannan's embedding technique for the search LWE problem
- Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing
- Multi-bit leveled homomorphic encryption via dual LWE-based
- Faster homomorphic encryption over GPGPUs via hierarchical DGT
- Attribute-based conditional proxy re-encryption in the standard model under LWE
- On the higher-bit version of approximate inhomogeneous short integer solution problem
- Cryptanalysis of a round optimal lattice-based multisignature scheme
- On the concrete security of LWE with small secret
- Anonymous, robust post-quantum public key encryption
- Decryption failure is more likely after success
- scientific article; zbMATH DE number 697799 (Why is no real title available?)
- Secure Implementation of Lattice-Based Encryption Schemes
- Concrete security from worst-case to average-case lattice reductions
- Finding and evaluating parameters for BGV
- Secret computation of purchase history data using somewhat homomorphic encryption
- Sampling from discrete Gaussians for lattice-based cryptography on a constrained device
- Zaytun: lattice based PKE and KEM with shorter ciphertext size
- Provably weak instances of Ring-LWE
- Making the BKW algorithm practical for LWE
- Security of public key encryption against resetting attacks
- Faster fully homomorphic encryption: bootstrapping in less than 0.1 seconds
- Gauss sieve algorithm on GPUs
- MyOPE: malicious security for oblivious polynomial evaluation
- Tightly secure ring-LWE based key encapsulation with short ciphertexts
- Lattice-based identity-based resplittable threshold public key encryption scheme
- Predicting the concrete security of LWE against the dual attack using binary search
- Group signatures and more from isogenies and lattices: generic, simple, and efficient
- Analyzing the shuffling side-channel countermeasure for lattice-based signatures
- Vandermonde meets Regev: public key encryption schemes based on partial Vandermonde problems
- On the complexity of the BKW algorithm on LWE
- Semantic security and indistinguishability in the quantum world
- Scalable ciphertext compression techniques for post-quantum KEMs and their applications
- LP solutions of vectorial integer subset sums -- cryptanalysis of Galbraith's binary matrix LWE
- A Ring-LWE-based digital signature inspired by Lindner-Peikert scheme
- The polynomial learning with errors problem and the smearing condition
- \(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryption
- Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes
- A public-key encryption scheme based on non-linear indeterminate equations
- On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL
- A practical post-quantum public-key cryptosystem based on spLWE
- Improved efficiency of MP12
- Practical analysis of key recovery attack against search-LWE problem
This page was built for publication: Better key sizes (and attacks) for LWE-based encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3073715)