BKZ 2.0: Better Lattice Security Estimates

From MaRDI portal
Publication:3102173

DOI10.1007/978-3-642-25385-0_1zbMath1227.94037OpenAlexW80562455WikidataQ57567989 ScholiaQ57567989MaRDI QIDQ3102173

Phong Q. Nguyen, Yuanmi Chen

Publication date: 2 December 2011

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-25385-0_1




Related Items

Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE\textsc{Hawk}: module LIP makes lattice signatures fast, compact and simpleOn the measurement and simulation of the BKZ behavior for \(q\)-ary latticesLog-\(\mathcal{S}\)-unit lattices using explicit Stickelberger generators to solve approx ideal-SVPDevelopment and analysis of massive parallelization of a lattice basis reduction algorithmFast practical lattice reduction through iterated compressionFault-enabled chosen-ciphertext attacks on KyberEstimating the hidden overheads in the BDGL lattice sieving algorithmLattice-based public key cryptosystems invoking linear mapping maskLattice-based cryptography: a surveyRevisiting security estimation for LWE with hints from a geometric perspectivePrivate AI: Machine Learning on Encrypted DataLattice reduction with approximate enumeration oracles. Practical algorithms and concrete performanceTowards faster polynomial-time lattice reductionA trace map attack against special ring-LWE samplesShortest vectors in lattices of Bai-Galbraith's embedding attack on the LWR problemHomomorphic Encryption StandardSieve, Enumerate, Slice, and Lift:A Tale of Three Signatures: Practical Attack of ECDSA with wNAFHomomorphic AES evaluation using the modified LTV schemePartially Known Nonces and Fault Injection Attacks on SM2 Signature AlgorithmLattice Reduction for Modular KnapsackCoded-BKW: Solving LWE Using Lattice CodesAn Improved BKW Algorithm for LWE with Applications to Cryptography and LatticesCryptanalysis of the Co-ACD AssumptionAn efficient lattice reduction using reuse technique blockwisely on NTRUSolving the search-LWE problem over projected latticesReview of cryptographic schemes applied to remote electronic voting systems: remaining challenges and the upcoming post-quantum paradigmAttacking ECDSA leaking discrete bits with a more efficient latticeOn a dual/hybrid approach to small secret LWE. A dual/enumeration technique for learning with errors and application to security estimates of FHE schemesLattice-based fault attacks on deterministic signature schemes of ECDSA and EdDSAShortest vector from lattice sieving: a few dimensions for freeOn the Efficacy of Solving LWE by Reduction to Unique-SVPSecure Statistical Analysis Using RLWE-Based Homomorphic EncryptionA Ring-LWE-based digital signature inspired by Lindner-Peikert scheme\(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryptionA non-commutative cryptosystem based on quaternion algebrasA Fast Phase-based Enumeration Algorithm for SVP Challenge Through $$y$$-Sparse Representations of Short Lattice VectorsPredicting truncated multiple recursive generators with unknown parametersFaster Sieving for Shortest Lattice Vectors Using Spherical Locality-Sensitive HashingLattice Point Enumeration on Block Reduced BasesFinding shortest lattice vectors faster using quantum searchPredicting the concrete security of LWE against the dual attack using binary searchA detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attackEstimation of the hardness of the learning with errors problem with a restricted number of samplesPotLLL: a polynomial time version of LLL with deep insertionsSecret computation of purchase history data using somewhat homomorphic encryptionNTRU Fatigue: How Stretched is Overstretched?Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALSGeneralized attack on ECDSA: known bits in arbitrary positionsOn the hardness of the finite field isomorphism problemRecovering secrets from prefix-dependent leakageA signature scheme from the finite field isomorphism problemFlattening NTRU for evaluation key free homomorphic encryptionSelf-dual DeepBKZ for finding short lattice vectorsEHNP strikes back: analyzing SM2 implementationsFaster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 SecondsImproved broadcast attacks against subset sum problems via lattice oracleImproving convergence and practicality of slide-type reductionsPost-quantum key exchange for the Internet and the open quantum safe projectSieving for closest lattice vectors (with preprocessing)Twisted-PHS: using the product formula to solve approx-SVP in ideal latticesSystematics of aligned axionsA lattice reduction algorithm based on sublattice BKZThe irreducible vectors of a lattice: some theory and applicationsChoosing Parameters for NTRUEncryptGauss Sieve Algorithm on GPUsAnalysis of Error Terms of Signatures Based on Learning with ErrorsUnnamed ItemAn Experimental Study of Kannan’s Embedding Technique for the Search LWE ProblemThe lattice-based digital signature scheme qTESLAETRU: NTRU over the Eisenstein integersDynamic self-dual DeepBKZ lattice reduction with free dimensions and its implementationLLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE schemeSecond order statistical behavior of LLL and BKZA public-key encryption scheme based on non-linear indeterminate equationsNTRU prime: reducing attack surface at low costUnnamed ItemVulnerable public keys in NTRU cryptosystemOn the complexity of the BKW algorithm on LWEAnalysis of DeepBKZ reduction for finding short lattice vectorsRevisiting Lattice Attacks on Overstretched NTRU ParametersOne-Shot Verifiable Encryption from LatticesRandom Sampling Revisited: Lattice Enumeration with Discrete PruningOn Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEALEnhancing Goldreich, Goldwasser and Halevi's scheme with intersecting latticesLearning strikes again: the case of the DRS signature schemePost-Quantum Cryptography: State of the ArtA Survey of Solving SVP Algorithms and Recent Strategies for Solving the SVP ChallengeModular lattice signatures, revisitedTFHE: fast fully homomorphic encryption over the torus(One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemesWorst case short lattice vector enumeration on block reduced bases of arbitrary blocksizesBKZParallel Implementation of BDD Enumeration for LWEThe convergence of slide-type reductionsOn the success probability of solving unique SVP via BKZBootstrapping fully homomorphic encryption over the integers in less than one secondA Subfield Lattice Attack on Overstretched NTRU AssumptionsUnnamed ItemQuantum Hardness of Learning Shallow Classical CircuitsA new polynomial-time variant of LLL with deep insertions for decreasing the squared-sum of Gram-Schmidt lengthsA polynomial-time algorithm for solving the hidden subset sum problemFaster enumeration-based lattice reduction: root Hermite factor \(k^{1/(2k)}\) time \(k^{k/8+o(k)}\)LWE with side information: attacks and concrete security estimationLattice-based blind signatures, revisitedImproved lattice enumeration algorithms by primal and dual reordering methodsA physical study of the LLL algorithmLattice-Based SNARGs and Their Application to More Efficient ObfuscationRevisiting orthogonal lattice attacks on approximate common divisor problems


Uses Software