\(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryption
From MaRDI portal
Publication:2170018
DOI10.1007/978-3-031-06944-4_20zbMath1497.94097OpenAlexW4285241375MaRDI QIDQ2170018
Jooyoung Lee, Seongkwang Kim, Jincheol Ha, Mincheol Son, Byeonghak Lee
Publication date: 30 August 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-06944-4_20
Related Items
Towards case-optimized hybrid homomorphic encryption. Featuring the \textsf{Elisabeth} stream cipher ⋮ Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato} ⋮ Combined fault and leakage resilience: composability, constructions and compiler ⋮ Fast blind rotation for bootstrapping FHEs ⋮ HERMES: efficient ring packing using MLWE ciphertexts and application to transciphering
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Lattice basis reduction: Improved practical algorithms and solving subset sum problems
- Rasta: a cipher with low ANDdepth and few ANDs per bit
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- Efficient homomorphic conversion between (ring) LWE ciphertexts
- Lattice reduction with approximate enumeration oracles. Practical algorithms and concrete performance
- Transciphering, using FiLIP and TFHE for an efficient delegation of computation
- Improved filter permutators for efficient FHE: better instances and implementations
- On the complexity of the BKW algorithm on LWE
- Revisiting the expected cost of solving uSVP and applications to LWE
- Homomorphic encryption for arithmetic of approximate numbers
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Optimized Interpolation Attacks on LowMC
- Higher-Order Cryptanalysis of LowMC
- Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts
- (Leveled) fully homomorphic encryption without bootstrapping
- Homomorphic Evaluation of the AES Circuit
- Ciphers for MPC and FHE
- FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second
- New Algorithms for Learning in Presence of Errors
- Better Key Sizes (and Attacks) for LWE-Based Encryption
- BKZ 2.0: Better Lattice Security Estimates
- On the Efficacy of Solving LWE by Reduction to Unique-SVP
- Hybrid approach for solving multivariate systems over finite fields
- Lattice Enumeration Using Extreme Pruning
- An inequality for Hilbert series of graded algebras.
- New directions in nearest neighbor searching with applications to lattice sieving
- The interpolation attack on block ciphers
- A Comparison of the Homomorphic Encryption Schemes FV and YASHE
- Lattice Decoding Attacks on Binary LWE
- The PHOTON Family of Lightweight Hash Functions
- Solving polynomial systems over finite fields
- Linear Cryptanalysis of Non Binary Ciphers
- Predicting Lattice Reduction
- Bounds for exponential sums
- On lattices, learning with errors, random linear codes, and cryptography
- Noise-tolerant learning, the parity problem, and the statistical query model
- Transciphering framework for approximate homomorphic encryption