Estimate all the {LWE, NTRU} schemes!

From MaRDI portal
Publication:1796806

DOI10.1007/978-3-319-98113-0_19OpenAlexW2805377271MaRDI QIDQ1796806

Eamonn W. Postlethwaite, Fernando Virdia, Rachel Player, Alex Davidson, Thomas Wunderer, Amit Deo, Martin R. Albrecht, Benjamin R. Curtis

Publication date: 17 October 2018

Full work available at URL: https://doi.org/10.1007/978-3-319-98113-0_19




Related Items (34)

SoK: how (not) to design and implement post-quantum cryptographyImproved Discrete Gaussian and Subgaussian Analysis for Lattice CryptographyMany a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key ExchangeLattice reduction with approximate enumeration oracles. Practical algorithms and concrete performanceA trace map attack against special ring-LWE samplesAn extension of Kannan's embedding for solving ring-based LWE problemsHow to find ternary LWE keys using locality sensitive hashingVandermonde meets Regev: public key encryption schemes based on partial Vandermonde problemsA Ring-LWE-based digital signature inspired by Lindner-Peikert schemeMultitarget Decryption Failure Attacks and Their Application to Saber and KyberPredicting the concrete security of LWE against the dual attack using binary searchGladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed DecryptionFaster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALSBatch bootstrapping. I: A new framework for SIMD bootstrapping in polynomial modulusFast first-order masked NTTRUSelf-dual DeepBKZ for finding short lattice vectorsHybrid dual and meet-LWE attackDevelopment and analysis of massive parallelization of a lattice basis reduction algorithmPolar coding for ring-LWE-based public key encryptionEfficient lattice-based inner-product functional encryptionConcrete security from worst-case to average-case lattice reductionsCalamari and Falafl: logarithmic (linkable) ring signatures from isogenies and latticesThe lattice-based digital signature scheme qTESLAAnalysis of DeepBKZ reduction for finding short lattice vectorsGroup signatures and more from isogenies and lattices: generic, simple, and efficientAchievable upper bound for the sup-norm of the product of elements of the ring of truncated polynomials and its application to the analysis of NTRU-like cryptosystemsA Survey of Solving SVP Algorithms and Recent Strategies for Solving the SVP ChallengeTFHE: fast fully homomorphic encryption over the torusOn the success probability of solving unique SVP via BKZFaster enumeration-based lattice reduction: root Hermite factor \(k^{1/(2k)}\) time \(k^{k/8+o(k)}\)LWE with side information: attacks and concrete security estimationDistinguishing attack on the NTRUCipher encryption schemeQuantum key search for ternary LWEOn removing rejection conditions in practical lattice-based signatures




This page was built for publication: Estimate all the {LWE, NTRU} schemes!