Pages that link to "Item:Q2096528"
From MaRDI portal
The following pages link to LWE with side information: attacks and concrete security estimation (Q2096528):
Displaying 30 items.
- SoK: how (not) to design and implement post-quantum cryptography (Q826276) (← links)
- On bounded distance decoding with predicate: breaking the ``lattice barrier'' for the hidden number problem (Q2056699) (← links)
- On the success probability of solving unique SVP via BKZ (Q2061913) (← links)
- Shorter lattice-based zero-knowledge proofs via one-time commitments (Q2061919) (← links)
- LWE with side information: attacks and concrete security estimation (Q2096528) (← links)
- Solving the search-LWE problem over projected lattices (Q2146741) (← links)
- How to find ternary LWE keys using locality sensitive hashing (Q2149799) (← links)
- Vandermonde meets Regev: public key encryption schemes based on partial Vandermonde problems (Q2161427) (← links)
- Information-set decoding with hints (Q2163764) (← links)
- Multitarget Decryption Failure Attacks and Their Application to Saber and Kyber (Q5087247) (← links)
- Sieve algorithms for some orthogonal integer lattices (Q6059067) (← links)
- Generalized attack on ECDSA: known bits in arbitrary positions (Q6063142) (← links)
- A lattice attack on CRYSTALS-Kyber with correlation power analysis (Q6547868) (← links)
- \textsf{FuLeeca}: a Lee-based signature scheme (Q6550578) (← links)
- Quantum augmented lattice attack on NTRU with side information (Q6575057) (← links)
- On the multi-user security of LWE-based NIKE (Q6587945) (← links)
- \textsc{Antrag}: annular NTRU trapdoor generation. Making \textsc{Mitaka} as secure as FALCON (Q6595914) (← links)
- NEV: faster and smaller NTRU encryption using vector decoding (Q6595920) (← links)
- Too many hints -- when LLL breaks LWE (Q6604869) (← links)
- SCA-LDPC: a code-based framework for key-recovery side-channel attacks on post-quantum encryption schemes (Q6604875) (← links)
- On the concrete security of LWE with small secret (Q6611798) (← links)
- Profiling side-channel attacks on Dilithium. A small bit-fiddling leak breaks it all (Q6619833) (← links)
- Bit security analysis of lattice-based KEMs under plaintext-checking attacks (Q6620048) (← links)
- Ring/module learning with errors under linear leakage -- hardness and applications (Q6635772) (← links)
- A refined hardness estimation of LWE in two-step mode (Q6635818) (← links)
- The complexity of algebraic algorithms for LWE (Q6637336) (← links)
- Key recovery attack on the partial Vandermonde knapsack problem (Q6637720) (← links)
- CryptAttackTester: high-assurance attack analysis (Q6652984) (← links)
- FuLeakage: breaking FuLeeca by learning attacks (Q6652988) (← links)
- Two-round threshold signature from algebraic one-more learning with errors (Q6653014) (← links)