New directions in nearest neighbor searching with applications to lattice sieving

From MaRDI portal
Publication:4575576

DOI10.1137/1.9781611974331.ch2zbMath1410.68093OpenAlexW2952033682WikidataQ57567981 ScholiaQ57567981MaRDI QIDQ4575576

Anja Becker, Thijs Laarhoven, Nicolas Gama, Léo Ducas

Publication date: 16 July 2018

Published in: Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1137/1.9781611974331.ch2




Related Items (66)

Binary vectors for fast distance and similarity estimationSoK: how (not) to design and implement post-quantum cryptographyDual lattice attacks for closest vector problems (with preprocessing)Improved Discrete Gaussian and Subgaussian Analysis for Lattice CryptographyDecryption Failure Is More Likely After SuccessHow to meet ternary LWE keysLattice reduction with approximate enumeration oracles. Practical algorithms and concrete performanceTowards faster polynomial-time lattice reductionLower bounds on lattice sieving and information set decodingHomomorphic Encryption StandardSieve, Enumerate, Slice, and Lift:How to find ternary LWE keys using locality sensitive hashingMaking the BKW algorithm practical for LWEOn a dual/hybrid approach to small secret LWE. A dual/enumeration technique for learning with errors and application to security estimates of FHE schemesGadget-based iNTRU lattice trapdoorsShortest vector from lattice sieving: a few dimensions for free\(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryption\textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}On the lattice isomorphism problem, quadratic forms, remarkable lattices, and cryptographyOn the Security of OSIDHPredicting the concrete security of LWE against the dual attack using binary searchEstimation of the hardness of the learning with errors problem with a restricted number of samplesLattice Sieving via Quantum Random WalksNew time-memory trade-offs for subset sum -- improving ISD in theory and practiceHull attacks on the lattice isomorphism problemEHNP strikes back: analyzing SM2 implementationsLattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable (extended abstract)Shorter hash-and-sign lattice-based signaturesOn the asymptotic complexity of solving LWEDevelopment and analysis of massive parallelization of a lattice basis reduction algorithmDoes the dual-sieve attack on learning with errors even work?Finding short integer solutions when the modulus is smallEstimating the hidden overheads in the BDGL lattice sieving algorithmSieving for closest lattice vectors (with preprocessing)Lattice-based cryptography: a survey\textsf{Orbweaver}: succinct linear functional commitments from latticesLaBRADOR: compact proofs for R1CS from Module-SISRevisiting security estimation for LWE with hints from a geometric perspectiveFast neighbor search by using revised \(k\)-d treeEstimating quantum speedups for lattice sievesDistance-based index structures for fast similarity searchGauss Sieve Algorithm on GPUsJust Take the Average! An Embarrassingly Simple $2^n$-Time Algorithm for SVP (and CVP)A Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$Lattice-based locality sensitive hashing is optimalIdentifying an unknown code by partial Gaussian eliminationQuantum algorithm design: techniques and applicationsUnnamed ItemThe lattice-based digital signature scheme qTESLAIndex structures for fast similarity search for real-valued vectors. IIndex structures for fast similarity search for binary vectorsImproved Algorithms for the Approximate k-List Problem in Euclidean NormComputing Generator in Cyclotomic Integer RingsOn Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEALUnnamed ItemApproximate Voronoi cells for lattices, revisitedUnnamed ItemUnnamed ItemThe randomized slicer for CVPP: sharper, faster, smaller, batchierA \(2^{n/2}\)-time algorithm for \(\sqrt{n} \)-SVP and \(\sqrt{n} \)-Hermite SVP, and an improved time-approximation tradeoff for (H)SVPOn bounded distance decoding with predicate: breaking the ``lattice barrier for the hidden number problemAdvanced lattice sieving on GPUs, with tensor coresFaster enumeration-based lattice reduction: root Hermite factor \(k^{1/(2k)}\) time \(k^{k/8+o(k)}\)Slide reduction, revisited -- filling the gaps in SVP approximationA new post-quantum multivariate polynomial public key encapsulation algorithmRevisiting orthogonal lattice attacks on approximate common divisor problems




This page was built for publication: New directions in nearest neighbor searching with applications to lattice sieving