FuLeakage: breaking FuLeeca by learning attacks
From MaRDI portal
Publication:6652988
DOI10.1007/978-3-031-68391-6_8MaRDI QIDQ6652988
Wessel P. J. van Woerden, Felicitas Hörmann
Publication date: 13 December 2024
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- On the concrete hardness of learning with errors
- Lattice basis reduction: Improved practical algorithms and solving subset sum problems
- On the success probability of solving unique SVP via BKZ
- LWE with side information: attacks and concrete security estimation
- On the RLWE/PLWE equivalence for cyclotomic number fields
- Trapdoors for hard lattices and new cryptographic constructions
- Finding the Closest Lattice Point by Iterative Slicing
- Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures
- NTRUSign With a New Perturbation
- Efficient quantum algorithms for computing class groups and solving the principal ideal problem in arbitrary degree number fields
- Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures
- Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign
- Recovering Short Generators of Principal Ideals in Cyclotomic Rings
- Learning strikes again: the case of the DRS signature scheme
- A key-recovery attack against Mitaka in the \(t\)-probing model
- \textsc{Hawk}: module LIP makes lattice signatures fast, compact and simple
- On module unique-SVP and NTRU
- \textsf{FuLeeca}: a Lee-based signature scheme
This page was built for publication: FuLeakage: breaking FuLeeca by learning attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6652988)