Lattice-based cryptography: a survey
From MaRDI portal
Publication:6183909
DOI10.1007/S11401-023-0053-6zbMATH Open1527.94071MaRDI QIDQ6183909FDOQ6183909
Authors: Xiaoyun Wang, Guangwu Xu, Yang Yu
Publication date: 4 January 2024
Published in: Chinese Annals of Mathematics. Series B (Search for Journal in Brave)
Recommendations
Analysis of algorithms and problem complexity (68Q25) Cryptography (94A60) Lattices and convex bodies (number-theoretic aspects) (11H06)
Cites Work
- BKZ 2.0: Better lattice security estimates
- Title not available (Why is that?)
- Title not available (Why is that?)
- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
- On ideal lattices and learning with errors over rings
- Fully homomorphic encryption using ideal lattices
- A sieve algorithm for the shortest lattice vector problem
- On lattices, learning with errors, random linear codes, and cryptography
- Factoring polynomials with rational coefficients
- Lattice basis reduction: Improved practical algorithms and solving subset sum problems
- Trapdoors for hard lattices and new cryptographic constructions
- Efficient public key encryption based on ideal lattices (extended abstract)
- Title not available (Why is that?)
- WHAT IS...the Leech Lattice?
- Lattice signatures without trapdoors
- Better key sizes (and attacks) for LWE-based encryption
- Title not available (Why is that?)
- Title not available (Why is that?)
- Attribute-based encryption for circuits
- Making NTRU as secure as worst-case problems over ideal lattices
- Fiat-Shamir with aborts: applications to lattice and factoring-based signatures
- Worst-case to average-case reductions for module lattices
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Title not available (Why is that?)
- Lattice enumeration using extreme pruning
- On the computation of lattice vectors of minimal length, successive minima and reduced bases with applications
- Title not available (Why is that?)
- The sphere packing problem in dimension 8
- Sieve algorithms for the shortest vector problem are practical
- New directions in nearest neighbor searching with applications to lattice sieving
- Title not available (Why is that?)
- Efficient identity-based encryption over NTRU lattices
- Approx-SVP in ideal lattices with pre-processing
- Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures
- Learning a zonotope and more: cryptanalysis of ntrusign countermeasures
- Computational aspects of lattices and their cryptographic applications
- Short Stickelberger class relations and application to Ideal-SVP
- Provably secure NTRU instances over prime cyclotomic rings
- Learning strikes again: the case of the DRS signature scheme
- Universal optimality of the \(E_8\) and Leech lattices and interpolation formulas
- On the hardness of the NTRU problem
- \textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}
- On module unique-SVP and NTRU
Cited In (6)
- A new method of constructing a lattice basis and its applications to cryptanalyse short exponent RSA
- Some Recent Progress in Lattice-Based Cryptography
- A decade of lattice cryptography
- LARA: a design concept for lattice-based encryption
- Post-quantum cryptosystems: open problems and solutions. Lattice-based cryptosystems
- Expressive Cryptography: Lattice Perspectives
This page was built for publication: Lattice-based cryptography: a survey
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6183909)