New Generic Algorithms for Hard Knapsacks

From MaRDI portal
Publication:3563838

DOI10.1007/978-3-642-13190-5_12zbMath1280.94069OpenAlexW1856875316MaRDI QIDQ3563838

N. A. Howgrave-Graham, Antoine Joux

Publication date: 1 June 2010

Published in: Advances in Cryptology – EUROCRYPT 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-13190-5_12




Related Items (34)

The Power of Few Qubits and Collisions – Subset Sum Below Grover’s BoundHow to meet ternary LWE keysMPC-friendly symmetric cryptography from alternating moduli: candidates, protocols, and applicationsImproved Information Set Decoding for Code-Based Cryptosystems with Constrained MemoryHow to find ternary LWE keys using locality sensitive hashingGeneralization of the Ball-Collision AlgorithmThe Modular Subset-Sum Problem and the size of deletion correcting codesRefined cryptanalysis of the GPRS ciphers GEA-1 and GEA-2McEliece needs a break -- solving McEliece-1284 and quasi-cyclic-2918 with modern ISDTime-Memory Tradeoffs for Large-Weight Syndrome Decoding in Ternary CodesLattice-based algorithms for number partitioning in the hard phaseNew time-memory trade-offs for subset sum -- improving ISD in theory and practiceZero-knowledge protocols for the subset sum problem from MPC-in-the-head with rejectionInformation set decoding for Lee-metric codes using restricted ballsImproved classical and quantum algorithms for subset-sumUnnamed ItemInteger factorization as subset-sum problemImproved combinatorial algorithms for the inhomogeneous short integer solution problemA low-memory algorithm for finding short product representations in finite groups.Cryptanalysis of the Knapsack GeneratorSubset Sum Quantumly in 1.17 n .An algorithmic framework for the generalized birthday problemTinyKeys: a new approach to efficient multi-party computationGeneralization of BJMM-ISD Using May-Ozerov Nearest Neighbor Algorithm over an Arbitrary Finite Field $$\mathbb {F}_q$$Efficient dissection of bicomposite problems with cryptanalytic applicationsUnnamed ItemCan we beat the square root bound for ECDLP over \(\mathbb{F}_p^2\) via representation?Improved attacks on knapsack problem with their variants and a knapsack type ID-schemeFaster Space-Efficient Algorithms for Subset Sum, $k$-Sum, and Related ProblemsTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesConstructing Carmichael numbers through improved subset-product algorithmsQuantum key search for ternary LWEA practical adaptive key recovery attack on the LGM (GSW-like) cryptosystem


Uses Software



This page was built for publication: New Generic Algorithms for Hard Knapsacks