Security guidelines for implementing homomorphic encryption
Abstract Fully Homomorphic Encryption (FHE) is a cryptographic primitive that allows
performing arbitrary operations on encrypted data. Since the conception of the idea in …
performing arbitrary operations on encrypted data. Since the conception of the idea in …
Smaug: Pushing lattice-based key encapsulation mechanisms to the limits
Recently, NIST has announced Kyber, a lattice-based key encapsulation mechanism (KEM),
as a post-quantum standard. However, it is not the most efficient scheme among the NIST's …
as a post-quantum standard. However, it is not the most efficient scheme among the NIST's …
Asymptotics of hybrid primal lattice attacks
DJ Bernstein - Cryptology ePrint Archive, 2023 - eprint.iacr.org
The literature gives the impression that (1) existing heuristics accurately predict how
effective lattice attacks are,(2) non-ternary lattice systems are not vulnerable to hybrid multi …
effective lattice attacks are,(2) non-ternary lattice systems are not vulnerable to hybrid multi …
Memory-efficient attacks on small lwe keys
Combinatorial attacks on small max norm LWE keys suffer enormous memory requirements,
which render them inefficient in realistic attack scenarios. Therefore, more memory-efficient …
which render them inefficient in realistic attack scenarios. Therefore, more memory-efficient …
[PDF][PDF] SMAUG: The key exchange algorithm based on module-LWE and module-LWR
This paper introduces SMAUG-T, a lattice-based post-quantum key exchange algorithm
submitted to Round 2 of the Korean Post-Quantum Cryptography Competition (KpqC) …
submitted to Round 2 of the Korean Post-Quantum Cryptography Competition (KpqC) …
Subfield Attack on NTRU by using symmetric function map
S Tian, Z Dong, K Wang, C Lv - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
We describe a subfield attack for NTRU problem by using the symmetric function map S k,
which is a generalization of results presented by Albrecht, Bai and Ducas [1] and Cheon …
which is a generalization of results presented by Albrecht, Bai and Ducas [1] and Cheon …
[PDF][PDF] How to Meet Ternary LWE Keys on Babai's Nearest Plane.
A cryptographic primitive based on the Learning With Errors (LWE) problem with its variants
is a promising candidate for the efficient quantum-resistant public key cryptosystem. The …
is a promising candidate for the efficient quantum-resistant public key cryptosystem. The …
Let's Meet Ternary Keys on Babai's Plane: A Hybrid of Lattice-reduction and Meet-LWE
A cryptographic primitive based on the Learning With Errors (LWE) problem with variants is
a promising candidate for the efficient quantum-resistant public key cryptosystem. As the …
a promising candidate for the efficient quantum-resistant public key cryptosystem. As the …
Improved meet-lwe attack via ternary trees
E Lee, J Lee, Y Son, Y Wang - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Abstract The Learning with Errors (LWE) problem with its variants over structured lattices has
been widely exploited in efficient post-quantum cryptosystems. Recently, May suggests the …
been widely exploited in efficient post-quantum cryptosystems. Recently, May suggests the …
Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors
H Zhu, S Kamada, M Kudo, T Takagi - International Workshop on Security, 2023 - Springer
Plenty of lattice-based cryptosystems use ternary or quinary sparse short vectors to
accelerate the computing procedure. The hybrid attack, proposed by Howgrave-Graham …
accelerate the computing procedure. The hybrid attack, proposed by Howgrave-Graham …