Provably Weak Instances of Ring-LWE Revisited
From MaRDI portal
Publication:2820481
DOI10.1007/978-3-662-49890-3_6zbMath1347.94025OpenAlexW2465263483MaRDI QIDQ2820481
Ilia Iliashenko, Wouter Castryck, Frederik Vercauteren
Publication date: 9 September 2016
Published in: Advances in Cryptology – EUROCRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://biblio.ugent.be/publication/7162559
Related Items (13)
Homomorphic Encryption Standard ⋮ Error analysis of weak poly-LWE instances ⋮ On the ring-LWE and polynomial-LWE problems ⋮ On the feasibility of single-trace attacks on the Gaussian sampler using a CDT ⋮ Security considerations for Galois non-dual RLWE families ⋮ Attacks on the Search RLWE Problem with Small Errors ⋮ On error distributions in ring-based LWE ⋮ LP Solutions of Vectorial Integer Subset Sums – Cryptanalysis of Galbraith’s Binary Matrix LWE ⋮ Private Conjunctive Query over Encrypted Data ⋮ How (Not) to Instantiate Ring-LWE ⋮ A Subfield Lattice Attack on Overstretched NTRU Assumptions ⋮ Algebraic Aspects of Solving Ring-LWE, Including Ring-Based Improvements in the Blum--Kalai--Wasserman Algorithm ⋮ Practical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiency
This page was built for publication: Provably Weak Instances of Ring-LWE Revisited