Cold Boot Attacks on Ring and Module LWE Keys Under the NTT
暂无分享,去创建一个
[1] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[2] Arnold Schönhage,et al. Schnelle Multiplikation großer Zahlen , 1971, Computing.
[3] Ravi Kannan,et al. Improved algorithms for integer programming and related lattice problems , 1983, STOC.
[4] Yael Tauman Kalai,et al. Public-Key Encryption Schemes with Auxiliary Inputs , 2010, TCC.
[5] Fernando Virdia,et al. Revisiting the Expected Cost of Solving uSVP and Applications to LWE , 2017, ASIACRYPT.
[6] Mingjie Liu,et al. Solving BDD by Enumeration: An Update , 2013, CT-RSA.
[7] Mark Stamp,et al. An algorithm for the k-error linear complexity of binary sequences with period 2n , 1993, IEEE Trans. Inf. Theory.
[8] Kenneth G. Paterson,et al. A Coding-Theoretic Approach to Recovering Noisy RSA Keys , 2012, IACR Cryptol. ePrint Arch..
[9] C. P. Schnorr,et al. A Hierarchy of Polynomial Time Lattice Basis Reduction Algorithms , 1987, Theor. Comput. Sci..
[10] Claus-Peter Schnorr,et al. Lattice Reduction by Random Sampling and Birthday Methods , 2003, STACS.
[11] Feng-Hao Liu,et al. Leakage Resilient Fully Homomorphic Encryption , 2014, IACR Cryptol. ePrint Arch..
[12] Satoshi Uehara,et al. An Algorithm for thek-Error Linear Complexity of Sequences over GF(pm) with Period pn, pa Prime , 1999, Inf. Comput..
[13] Thijs Laarhoven,et al. Sieving for Shortest Vectors in Lattices Using Angular Locality-Sensitive Hashing , 2015, CRYPTO.
[14] Satyanarayana V. Lokam,et al. SECURITY OF HOMOMORPHIC ENCRYPTION , 2017 .
[15] Abdel Alim Kamal,et al. Applications of SAT Solvers to AES Key Recovery from Decayed Key Schedule Images , 2010, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies.
[16] Stacey Jeffery,et al. Attacks on the AJPS Mersenne-based cryptosystem , 2017, IACR Cryptol. ePrint Arch..
[17] Jung Hee Cheon,et al. APPLICATIONS OF HOMOMORPHIC ENCRYPTION , 2017 .
[18] Hao Chen,et al. Simple Encrypted Arithmetic Library - SEAL v2.1 , 2016, Financial Cryptography Workshops.
[19] David Naccache,et al. On the Hardness of the Mersenne Low Hamming Ratio Assumption , 2017, IACR Cryptol. ePrint Arch..
[20] Kenneth G. Paterson,et al. Cold Boot Attacks on NTRU , 2017, INDOCRYPT.
[21] Chris Peikert,et al. A Toolkit for Ring-LWE Cryptography , 2013, IACR Cryptol. ePrint Arch..
[22] Martin R. Albrecht,et al. Algebraic Algorithms for LWE , 2015 .
[23] James L. Massey,et al. Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.
[24] Nick Howgrave-Graham,et al. A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU , 2007, CRYPTO.
[25] Vinod Vaikuntanathan,et al. Simultaneous Hardcore Bits and Cryptography against Memory Attacks , 2009, TCC.
[26] Bertram Poettering,et al. Cold Boot Attacks in the Discrete Logarithm Setting , 2015, CT-RSA.
[27] Oded Regev,et al. Lattice-Based Cryptography , 2006, CRYPTO.
[28] Aria Shahverdi,et al. On the Leakage Resilience of Ideal-Lattice Based Public Key Encryption , 2017, IACR Cryptol. ePrint Arch..
[29] Alexandr Andoni,et al. Near-Optimal Hashing Algorithms for Approximate Nearest Neighbor in High Dimensions , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[30] Alex Tsow,et al. An Improved Recovery Algorithm for Decayed AES Key Schedule Images , 2009, Selected Areas in Cryptography.
[31] Chris Peikert,et al. Better Key Sizes (and Attacks) for LWE-Based Encryption , 2011, CT-RSA.
[32] Sanjeev Arora,et al. New Algorithms for Learning in Presence of Errors , 2011, ICALP.
[33] Daniele Micciancio,et al. Fast Lattice Point Enumeration with Minimal Overhead , 2015, SODA.
[34] Franz Winkler,et al. Polynomial Algorithms in Computer Algebra , 1996, Texts and Monographs in Symbolic Computation.
[35] Piotr Indyk,et al. Approximate nearest neighbors: towards removing the curse of dimensionality , 1998, STOC '98.
[36] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[37] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[38] Phong Q. Nguyen,et al. BKZ 2.0: Better Lattice Security Estimates , 2011, ASIACRYPT.
[39] Krzysztof Pietrzak,et al. Subspace LWE , 2012, TCC.
[40] Martin R. Albrecht,et al. Cold Boot Key Recovery by Solving Polynomial Systems with Noise , 2011, ACNS.
[41] Martin R. Albrecht,et al. On the concrete hardness of Learning with Errors , 2015, J. Math. Cryptol..
[42] Chris Peikert,et al. A Decade of Lattice Cryptography , 2016, Found. Trends Theor. Comput. Sci..
[43] Erdem Alkim,et al. Post-quantum Key Exchange - A New Hope , 2016, USENIX Security Symposium.
[44] S. Halevi,et al. A STANDARD API FOR RLWE-BASED HOMOMORPHIC ENCRYPTION , 2018 .
[45] Damien Stehlé,et al. Worst-case to average-case reductions for module lattices , 2014, Designs, Codes and Cryptography.