Simple encrypted arithmetic library-SEAL v2. 1

H Chen, K Laine, R Player - Financial Cryptography and Data Security: FC …, 2017 - Springer
Achieving fully homomorphic encryption was a longstanding open problem in cryptography
until it was resolved by Gentry in 2009. Soon after, several homomorphic encryption …

Salsa: Attacking lattice cryptography with transformers

E Wenger, M Chen, F Charton… - Advances in Neural …, 2022 - proceedings.neurips.cc
Currently deployed public-key cryptosystems will be vulnerable to attacks by full-scale
quantum computers. Consequently," quantum resistant" cryptosystems are in high demand …

Post-quantum era privacy protection for intelligent infrastructures

L Malina, P Dzurenda, S Ricci, J Hajny… - IEEE …, 2021 - ieeexplore.ieee.org
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …

[PDF][PDF] Simple encrypted arithmetic library 2.3. 1

K Laine - Microsoft Research https://www. microsoft. com/en-us …, 2017 - microsoft.com
Traditional encryption schemes, both symmetric and asymmetric, were not designed to
respect any algebraic structure of the plaintext and ciphertext spaces, ie no computations …

[PDF][PDF] Simple encrypted arithmetic library-seal (v2. 0)

K Laine, R Player - Technical report, 2016 - microsoft.com
Traditional encryption schemes, both symmetric and asymmetric, were not designed to
respect the algebraic structure of the plaintext and ciphertext spaces. Many schemes, such …

Quantum lattice enumeration and tweaking discrete pruning

Y Aono, PQ Nguyen, Y Shen - International Conference on the Theory and …, 2018 - Springer
Enumeration is a fundamental lattice algorithm. We show how to speed up enumeration on a
quantum computer, which affects the security estimates of several lattice-based submissions …

[PDF][PDF] Simple encrypted arithmetic library v2. 3.0

H Chen, K Han, Z Huang, A Jalali… - Microsoft Research …, 2017 - microsoft.com
Traditional encryption schemes, both symmetric and asymmetric, were not designed to
respect any algebraic structure of the plaintext and ciphertext spaces, ie no computations …

On the concrete security of LWE with small secret

H Chen, L Chua, K Lauter, Y Song - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Lattice-based cryptography is currently under consideration for standardization in the
ongoing NIST PQC Post-Quantum Cryptography competition, and is used as the basis for …

A practical view of the state-of-the-art of lattice-based cryptanalysis

A Mariano, T Laarhoven, F Correia, M Rodrigues… - Ieee …, 2017 - ieeexplore.ieee.org
This paper describes the lattice problems that are key in the study of lattice-based
cryptography, identifies and categorizes methods for solving these problems, analyzes …

An experimental study of Kannan's embedding technique for the search LWE problem

Y Wang, Y Aono, T Takagi - … , ICICS 2017, Bei**g, China, December 6-8 …, 2018 - Springer
The learning with errors (LWE) problem is considered as one of the most compelling
candidates as the security base for the post-quantum cryptosystems. For the application of …