Estimate all the {LWE, NTRU} schemes!
From MaRDI portal
Publication:1796806
DOI10.1007/978-3-319-98113-0_19OpenAlexW2805377271MaRDI QIDQ1796806
Eamonn W. Postlethwaite, Fernando Virdia, Rachel Player, Alex Davidson, Thomas Wunderer, Amit Deo, Martin R. Albrecht, Benjamin R. Curtis
Publication date: 17 October 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-98113-0_19
Related Items (34)
SoK: how (not) to design and implement post-quantum cryptography ⋮ Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography ⋮ Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange ⋮ Lattice reduction with approximate enumeration oracles. Practical algorithms and concrete performance ⋮ A trace map attack against special ring-LWE samples ⋮ An extension of Kannan's embedding for solving ring-based LWE problems ⋮ How to find ternary LWE keys using locality sensitive hashing ⋮ Vandermonde meets Regev: public key encryption schemes based on partial Vandermonde problems ⋮ A Ring-LWE-based digital signature inspired by Lindner-Peikert scheme ⋮ Multitarget Decryption Failure Attacks and Their Application to Saber and Kyber ⋮ Predicting the concrete security of LWE against the dual attack using binary search ⋮ Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption ⋮ Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS ⋮ Batch bootstrapping. I: A new framework for SIMD bootstrapping in polynomial modulus ⋮ Fast first-order masked NTTRU ⋮ Self-dual DeepBKZ for finding short lattice vectors ⋮ Hybrid dual and meet-LWE attack ⋮ Development and analysis of massive parallelization of a lattice basis reduction algorithm ⋮ Polar coding for ring-LWE-based public key encryption ⋮ Efficient lattice-based inner-product functional encryption ⋮ Concrete security from worst-case to average-case lattice reductions ⋮ Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices ⋮ The lattice-based digital signature scheme qTESLA ⋮ Analysis of DeepBKZ reduction for finding short lattice vectors ⋮ Group signatures and more from isogenies and lattices: generic, simple, and efficient ⋮ Achievable upper bound for the sup-norm of the product of elements of the ring of truncated polynomials and its application to the analysis of NTRU-like cryptosystems ⋮ A Survey of Solving SVP Algorithms and Recent Strategies for Solving the SVP Challenge ⋮ TFHE: fast fully homomorphic encryption over the torus ⋮ On the success probability of solving unique SVP via BKZ ⋮ Faster enumeration-based lattice reduction: root Hermite factor \(k^{1/(2k)}\) time \(k^{k/8+o(k)}\) ⋮ LWE with side information: attacks and concrete security estimation ⋮ Distinguishing attack on the NTRUCipher encryption scheme ⋮ Quantum key search for ternary LWE ⋮ On removing rejection conditions in practical lattice-based signatures
This page was built for publication: Estimate all the {LWE, NTRU} schemes!