Revisiting security estimation for LWE with hints from a geometric perspective
From MaRDI portal
Publication:6190156
DOI10.1007/978-3-031-38554-4_24OpenAlexW4385654350MaRDI QIDQ6190156
Dana Dachman-Soled, Huijing Gong, Tom Hanson, Hunter Kippen
Publication date: 6 February 2024
Published in: Advances in Cryptology – CRYPTO 2023 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-38554-4_24
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Geometric algorithms and combinatorial optimization
- Lattice basis reduction: Improved practical algorithms and solving subset sum problems
- Measuring, simulating and exploiting the head concavity phenomenon in BKZ
- Assessing the feasibility of single trace power analysis of Frodo
- On equivalence of major relaxation methods for minimum ellipsoid covering intersection of ellipsoids
- Speed-ups and time-memory trade-offs for tuple lattice sieving
- Complete attack on RLWE key exchange with reused keys, without signal leakage
- (One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemes
- LWE with side information: attacks and concrete security estimation
- Lattice reduction with approximate enumeration oracles. Practical algorithms and concrete performance
- On the complexity of the BKW algorithm on LWE
- Cold boot attacks on BLISS
- Decryption failure attacks on IND-CCA secure lattice-based schemes
- Assessment of the key-reuse resilience of NewHope
- Revisiting the expected cost of solving uSVP and applications to LWE
- Integer Programming with a Fixed Number of Variables
- BKZ 2.0: Better Lattice Security Estimates
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Feature Article—The Ellipsoid Method: A Survey
- New directions in nearest neighbor searching with applications to lattice sieving
- Decryption Failure Is More Likely After Success
- Symmetry of convex sets and its applications to the extremal ellipsoids of convex bodies
- A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs
- Continuous LWE
- Hull attacks on the lattice isomorphism problem
This page was built for publication: Revisiting security estimation for LWE with hints from a geometric perspective