Lattice Decoding Attacks on Binary LWE
From MaRDI portal
Publication:5170784
DOI10.1007/978-3-319-08344-5_21zbMath1337.94020OpenAlexW70060353WikidataQ61914014 ScholiaQ61914014MaRDI QIDQ5170784
Publication date: 24 July 2014
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-08344-5_21
Related Items (19)
How to meet ternary LWE keys ⋮ Shortest vectors in lattices of Bai-Galbraith's embedding attack on the LWR problem ⋮ An extension of Kannan's embedding for solving ring-based LWE problems ⋮ On a dual/hybrid approach to small secret LWE. A dual/enumeration technique for learning with errors and application to security estimates of FHE schemes ⋮ Tightly secure ring-LWE based key encapsulation with short ciphertexts ⋮ \(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryption ⋮ Predicting the concrete security of LWE against the dual attack using binary search ⋮ A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack ⋮ Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS ⋮ Lattice-based public key cryptosystems invoking linear mapping mask ⋮ A Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$ ⋮ A public-key encryption scheme based on non-linear indeterminate equations ⋮ On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL ⋮ Enhancing Goldreich, Goldwasser and Halevi's scheme with intersecting lattices ⋮ Post-Quantum Cryptography: State of the Art ⋮ Parallel Implementation of BDD Enumeration for LWE ⋮ On the success probability of solving unique SVP via BKZ ⋮ Unnamed Item ⋮ Quantum key search for ternary LWE
This page was built for publication: Lattice Decoding Attacks on Binary LWE