EHNP strikes back: analyzing SM2 implementations
From MaRDI portal
Publication:6103105
DOI10.1007/978-3-031-17433-9_25zbMath1515.94099OpenAlexW4312465613MaRDI QIDQ6103105
Qingfeng Cheng, Jian Weng, Jinzheng Cao
Publication date: 2 June 2023
Published in: Progress in Cryptology - AFRICACRYPT 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-17433-9_25
Cites Work
- Unnamed Item
- Unnamed Item
- The LLL algorithm. Survey and applications
- Factoring polynomials with rational coefficients
- Shortest vector from lattice sieving: a few dimensions for free
- On bounded distance decoding with predicate: breaking the ``lattice barrier for the hidden number problem
- Advanced lattice sieving on GPUs, with tensor cores
- LWE with side information: attacks and concrete security estimation
- Attacking ECDSA leaking discrete bits with a more efficient lattice
- The general sieve kernel and new records in lattice reduction
- Revisiting the expected cost of solving uSVP and applications to LWE
- Just a Little Bit More
- Practical, Predictable Lattice Basis Reduction
- BKZ 2.0: Better Lattice Security Estimates
- Sieving for Shortest Vectors in Lattices Using Angular Locality-Sensitive Hashing
- Lattice-based Cryptography
- New directions in nearest neighbor searching with applications to lattice sieving
- A Tale of Three Signatures: Practical Attack of ECDSA with wNAF
- Analyzing Blockwise Lattice Algorithms Using Dynamical Systems
This page was built for publication: EHNP strikes back: analyzing SM2 implementations