BKZ

From MaRDI portal
Software:22207



swMATH10242MaRDI QIDQ22207


No author found.





Related Items (84)

Lattice reduction with approximate enumeration oracles. Practical algorithms and concrete performanceTowards faster polynomial-time lattice reductionA trace map attack against special ring-LWE samplesShortest vectors in lattices of Bai-Galbraith's embedding attack on the LWR problemHomomorphic Encryption StandardFaster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the IntegersTrapdoors for Lattices: Simpler, Tighter, Faster, SmallerSieve, Enumerate, Slice, and Lift:A Tale of Three Signatures: Practical Attack of ECDSA with wNAFPublic-Key Cryptography from New Multivariate Quadratic AssumptionsHomomorphic AES evaluation using the modified LTV schemeLattice Reduction for Modular KnapsackCoded-BKW: Solving LWE Using Lattice CodesAn Improved BKW Algorithm for LWE with Applications to Cryptography and LatticesAn efficient lattice reduction using reuse technique blockwisely on NTRUSolving the search-LWE problem over projected latticesReview of cryptographic schemes applied to remote electronic voting systems: remaining challenges and the upcoming post-quantum paradigmAttacking ECDSA leaking discrete bits with a more efficient latticeMultiparty Computation from Somewhat Homomorphic EncryptionLattice-based fault attacks on deterministic signature schemes of ECDSA and EdDSASecure Statistical Analysis Using RLWE-Based Homomorphic Encryption\(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryptionA non-commutative cryptosystem based on quaternion algebrasPredicting truncated multiple recursive generators with unknown parametersFinding shortest lattice vectors faster using quantum searchPredicting the concrete security of LWE against the dual attack using binary searchA detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attackEstimation of the hardness of the learning with errors problem with a restricted number of samplesPotLLL: a polynomial time version of LLL with deep insertionsSecret computation of purchase history data using somewhat homomorphic encryptionRecovering secrets from prefix-dependent leakageA signature scheme from the finite field isomorphism problemFlattening NTRU for evaluation key free homomorphic encryptionSelf-dual DeepBKZ for finding short lattice vectorsFaster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 SecondsImproved broadcast attacks against subset sum problems via lattice oracleImproving convergence and practicality of slide-type reductionsPost-quantum key exchange for the Internet and the open quantum safe projectTwisted-PHS: using the product formula to solve approx-SVP in ideal latticesSystematics of aligned axionsA lattice reduction algorithm based on sublattice BKZThe irreducible vectors of a lattice: some theory and applicationsChoosing Parameters for NTRUEncryptGauss Sieve Algorithm on GPUsAnalysis of Error Terms of Signatures Based on Learning with ErrorsUnnamed ItemAn Experimental Study of Kannan’s Embedding Technique for the Search LWE ProblemETRU: NTRU over the Eisenstein integersLLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE schemeAn Improved Compression Technique for Signatures Based on Learning with ErrorsUnnamed ItemPractical Lattice-Based Cryptography: A Signature Scheme for Embedded SystemsOn the complexity of the BKW algorithm on LWEThe Bussard-Bagga and Other Distance-Bounding Protocols under AttacksAnalysis of DeepBKZ reduction for finding short lattice vectorsRevisiting Lattice Attacks on Overstretched NTRU ParametersOne-Shot Verifiable Encryption from LatticesRandom Sampling Revisited: Lattice Enumeration with Discrete PruningOn Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEALEnhancing Goldreich, Goldwasser and Halevi's scheme with intersecting latticesSolving the Shortest Vector Problem in Lattices Faster Using Quantum SearchLearning strikes again: the case of the DRS signature schemePost-Quantum Cryptography: State of the ArtThe general sieve kernel and new records in lattice reductionModular lattice signatures, revisitedTFHE: fast fully homomorphic encryption over the torusWorst case short lattice vector enumeration on block reduced bases of arbitrary blocksizesParallel Implementation of BDD Enumeration for LWEA Comparison of the Homomorphic Encryption Schemes FV and YASHEA Subfield Lattice Attack on Overstretched NTRU AssumptionsUnnamed ItemQuantum Hardness of Learning Shallow Classical CircuitsHardness of SIS and LWE with Small ParametersA new polynomial-time variant of LLL with deep insertions for decreasing the squared-sum of Gram-Schmidt lengthsA polynomial-time algorithm for solving the hidden subset sum problemFaster enumeration-based lattice reduction: root Hermite factor \(k^{1/(2k)}\) time \(k^{k/8+o(k)}\)LWE with side information: attacks and concrete security estimationLattice-based blind signatures, revisitedImproved lattice enumeration algorithms by primal and dual reordering methodsImproved Security for a Ring-Based Fully Homomorphic Encryption SchemeEstimating Key Sizes for High Dimensional Lattice-Based SystemsA physical study of the LLL algorithmLattice-Based SNARGs and Their Application to More Efficient ObfuscationRevisiting orthogonal lattice attacks on approximate common divisor problems


This page was built for software: BKZ