A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU

From MaRDI portal
Publication:3612548

DOI10.1007/978-3-540-74143-5_9zbMath1215.94053OpenAlexW1531850752MaRDI QIDQ3612548

N. A. Howgrave-Graham

Publication date: 10 March 2009

Published in: Advances in Cryptology - CRYPTO 2007 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-74143-5_9




Related Items (33)

How to meet ternary LWE keysA trace map attack against special ring-LWE samplesOn a dual/hybrid approach to small secret LWE. A dual/enumeration technique for learning with errors and application to security estimates of FHE schemesPredicting the concrete security of LWE against the dual attack using binary searchEfficient public-key operation in multivariate schemesA detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attackEfficient Nyberg-Rueppel type of NTRU digital signature algorithmFaster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALSA signature scheme from the finite field isomorphism problemRevisiting lower dimension lattice attacks on NTRUShorter hash-and-sign lattice-based signaturesHybrid dual and meet-LWE attackOn the measurement and simulation of the BKZ behavior for \(q\)-ary latticesD-NTRU: more efficient and average-case IND-CPA secure NTRU variantDoes the dual-sieve attack on learning with errors even work?Finding short integer solutions when the modulus is smallReduced memory meet-in-the-middle attack against the NTRU private keyChoosing Parameters for NTRUEncryptImproved combinatorial algorithms for the inhomogeneous short integer solution problemProvably secure NTRUEncrypt over any cyclotomic fieldETRU: NTRU over the Eisenstein integersNTRU prime: reducing attack surface at low costProvably Secure NTRU Instances over Prime Cyclotomic RingsRevisiting Lattice Attacks on Overstretched NTRU ParametersOn Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEALModular lattice signatures, revisitedImproved classical cryptanalysis of SIKE in practiceOn the success probability of solving unique SVP via BKZThe Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEsA Subfield Lattice Attack on Overstretched NTRU AssumptionsLWE with side information: attacks and concrete security estimationCryptanalysis of ITRUQuantum key search for ternary LWE


Uses Software



This page was built for publication: A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU