A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU
From MaRDI portal
Publication:3612548
DOI10.1007/978-3-540-74143-5_9zbMath1215.94053OpenAlexW1531850752MaRDI QIDQ3612548
Publication date: 10 March 2009
Published in: Advances in Cryptology - CRYPTO 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-74143-5_9
Related Items (33)
How to meet ternary LWE keys ⋮ A trace map attack against special ring-LWE samples ⋮ On a dual/hybrid approach to small secret LWE. A dual/enumeration technique for learning with errors and application to security estimates of FHE schemes ⋮ Predicting the concrete security of LWE against the dual attack using binary search ⋮ Efficient public-key operation in multivariate schemes ⋮ A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack ⋮ Efficient Nyberg-Rueppel type of NTRU digital signature algorithm ⋮ Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS ⋮ A signature scheme from the finite field isomorphism problem ⋮ Revisiting lower dimension lattice attacks on NTRU ⋮ Shorter hash-and-sign lattice-based signatures ⋮ Hybrid dual and meet-LWE attack ⋮ On the measurement and simulation of the BKZ behavior for \(q\)-ary lattices ⋮ D-NTRU: more efficient and average-case IND-CPA secure NTRU variant ⋮ Does the dual-sieve attack on learning with errors even work? ⋮ Finding short integer solutions when the modulus is small ⋮ Reduced memory meet-in-the-middle attack against the NTRU private key ⋮ Choosing Parameters for NTRUEncrypt ⋮ Improved combinatorial algorithms for the inhomogeneous short integer solution problem ⋮ Provably secure NTRUEncrypt over any cyclotomic field ⋮ ETRU: NTRU over the Eisenstein integers ⋮ NTRU prime: reducing attack surface at low cost ⋮ Provably Secure NTRU Instances over Prime Cyclotomic Rings ⋮ Revisiting Lattice Attacks on Overstretched NTRU Parameters ⋮ On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL ⋮ Modular lattice signatures, revisited ⋮ Improved classical cryptanalysis of SIKE in practice ⋮ On the success probability of solving unique SVP via BKZ ⋮ The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs ⋮ A Subfield Lattice Attack on Overstretched NTRU Assumptions ⋮ LWE with side information: attacks and concrete security estimation ⋮ Cryptanalysis of ITRU ⋮ Quantum key search for ternary LWE
Uses Software
This page was built for publication: A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU