Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
On the concrete hardness of learning with errors
The learning with errors (LWE) problem has become a central building block of modern
cryptographic constructions. This work collects and presents hardness results for concrete …
cryptographic constructions. This work collects and presents hardness results for concrete …
Post-quantum key {Exchange—A} new hope
At IEEE Security & Privacy 2015, Bos, Costello, Naehrig, and Stebila proposed an
instantiation of Peikert's ring-learning-with-errors–based (Ring-LWE) key exchange protocol …
instantiation of Peikert's ring-learning-with-errors–based (Ring-LWE) key exchange protocol …
[PDF][PDF] CRYSTALS-Kyber algorithm specifications and supporting documentation
• Increase noise parameter for Kyber512 In the round-2 submission of Kyber, the decryption
error for Kyber512 was rather conservative, while at the same time, there were requests to …
error for Kyber512 was rather conservative, while at the same time, there were requests to …
Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
In this paper, we introduce Saber, a package of cryptographic primitives whose security
relies on the hardness of the Module Learning With Rounding problem (Mod-LWR). We first …
relies on the hardness of the Module Learning With Rounding problem (Mod-LWR). We first …
Frodo: Take off the ring! practical, quantum-secure key exchange from LWE
Lattice-based cryptography offers some of the most attractive primitives believed to be
resistant to quantum computers. Following increasing interest from both companies and …
resistant to quantum computers. Following increasing interest from both companies and …
Towards security recommendations for public-key infrastructures for production environments in the post-quantum era
Quantum computing technologies pose a significant threat to the currently employed public-
key cryptography protocols. In this paper, we discuss the impact of the quantum threat on …
key cryptography protocols. In this paper, we discuss the impact of the quantum threat on …
A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and graded encoding schemes
The subfield attack exploits the presence of a subfield to solve overstretched versions of the
NTRU assumption: norming the public key h down to a subfield may lead to an easier lattice …
NTRU assumption: norming the public key h down to a subfield may lead to an easier lattice …
Estimate all the {LWE, NTRU} schemes!
We consider all LWE-and NTRU-based encryption, key encapsulation, and digital signature
schemes proposed for standardisation as part of the Post-Quantum Cryptography process …
schemes proposed for standardisation as part of the Post-Quantum Cryptography process …
Efficient FHEW bootstrap** with small evaluation keys, and applications to threshold homomorphic encryption
There are two competing approaches to bootstrap the FHEW fully homomorphic encryption
scheme (Ducas and Micciancio, Eurocrypt 2015) and its variants: the original AP/FHEW …
scheme (Ducas and Micciancio, Eurocrypt 2015) and its variants: the original AP/FHEW …
On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL
MR Albrecht - Annual International Conference on the Theory and …, 2017 - Springer
We present novel variants of the dual-lattice attack against LWE in the presence of an
unusually short secret. These variants are informed by recent progress in BKW-style …
unusually short secret. These variants are informed by recent progress in BKW-style …