Cryptanalysis of the \textsc{Peregrine} lattice-based signature scheme
From MaRDI portal
Publication:6635758
DOI10.1007/978-3-031-57718-5_13MaRDI QIDQ6635758
Masayuki Abe, Moeto Suzuki, Mehdi Tibouchi, Yang Yu, Shiduo Zhang, Thomas Espitau, Xiuhan Lin
Publication date: 12 November 2024
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- On Lovász' lattice reduction and the nearest lattice point problem
- The matrix sign function and computations in systems
- One bit is all it takes: a devastating timing attack on BLISS's non-constant time sign flips
- How to meet ternary LWE keys
- How to find ternary LWE keys using locality sensitive hashing
- \textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}
- Efficient Identity-Based Encryption over NTRU Lattices
- Simple Lattice Trapdoor Sampling from a Broad Class of Distributions
- Trapdoors for hard lattices and new cryptographic constructions
- An Efficient and Parallel Gaussian Sampler for Lattices
- Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures
- Order Statistics
- Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures
- A key-recovery attack against Mitaka in the \(t\)-probing model
This page was built for publication: Cryptanalysis of the \textsc{Peregrine} lattice-based signature scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6635758)