Security guidelines for implementing homomorphic encryption

JP Bossuat, R Cammarota, I Chillotti… - Cryptology ePrint …, 2024 - eprint.iacr.org
Abstract Fully Homomorphic Encryption (FHE) is a cryptographic primitive that allows
performing arbitrary operations on encrypted data. Since the conception of the idea in …

Smaug: Pushing lattice-based key encapsulation mechanisms to the limits

JH Cheon, H Choe, D Hong, MJ Yi - International Conference on Selected …, 2023 - Springer
Recently, NIST has announced Kyber, a lattice-based key encapsulation mechanism (KEM),
as a post-quantum standard. However, it is not the most efficient scheme among the NIST's …

Asymptotics of hybrid primal lattice attacks

DJ Bernstein - Cryptology ePrint Archive, 2023 - eprint.iacr.org
The literature gives the impression that (1) existing heuristics accurately predict how
effective lattice attacks are,(2) non-ternary lattice systems are not vulnerable to hybrid multi …

Memory-efficient attacks on small lwe keys

A Esser, A Mukherjee, S Sarkar - Journal of Cryptology, 2024 - Springer
Combinatorial attacks on small max norm LWE keys suffer enormous memory requirements,
which render them inefficient in realistic attack scenarios. Therefore, more memory-efficient …

[PDF][PDF] SMAUG: The key exchange algorithm based on module-LWE and module-LWR

JH Cheon, H Choe, D Hong, J Hong… - Algorithm …, 2024 - hmchoe0528.github.io
This paper introduces SMAUG-T, a lattice-based post-quantum key exchange algorithm
submitted to Round 2 of the Korean Post-Quantum Cryptography Competition (KpqC) …

Subfield Attack on NTRU by using symmetric function map

S Tian, Z Dong, K Wang, C Lv - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
We describe a subfield attack for NTRU problem by using the symmetric function map S k,
which is a generalization of results presented by Albrecht, Bai and Ducas [1] and Cheon …

[PDF][PDF] How to Meet Ternary LWE Keys on Babai's Nearest Plane.

M Hhan, J Kim, C Lee, Y Son - IACR Cryptol. ePrint Arch., 2022 - iacr.steepath.eu
A cryptographic primitive based on the Learning With Errors (LWE) problem with its variants
is a promising candidate for the efficient quantum-resistant public key cryptosystem. The …

Let's Meet Ternary Keys on Babai's Plane: A Hybrid of Lattice-reduction and Meet-LWE

M Hhan, J Kim, C Lee, Y Son - Cryptology ePrint Archive, 2022 - eprint.iacr.org
A cryptographic primitive based on the Learning With Errors (LWE) problem with variants is
a promising candidate for the efficient quantum-resistant public key cryptosystem. As the …

Improved meet-lwe attack via ternary trees

E Lee, J Lee, Y Son, Y Wang - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Abstract The Learning with Errors (LWE) problem with its variants over structured lattices has
been widely exploited in efficient post-quantum cryptosystems. Recently, May suggests the …

Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors

H Zhu, S Kamada, M Kudo, T Takagi - International Workshop on Security, 2023 - Springer
Plenty of lattice-based cryptosystems use ternary or quinary sparse short vectors to
accelerate the computing procedure. The hybrid attack, proposed by Howgrave-Graham …