A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE
暂无分享,去创建一个
Jung Hee Cheon | Minki Hhan | Yongha Son | Seungwan Hong | J. Cheon | Seungwan Hong | Minki Hhan | Yongha Son
[1] Masahiro Yagisawa,et al. Fully Homomorphic Encryption without bootstrapping , 2015, IACR Cryptol. ePrint Arch..
[2] Nick Howgrave-Graham,et al. A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU , 2007, CRYPTO.
[3] László Babai,et al. On Lovász’ lattice reduction and the nearest lattice point problem , 1986, Comb..
[4] Thomas Wunderer,et al. Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates , 2016, IACR Cryptol. ePrint Arch..
[5] Erdem Alkim,et al. Post-quantum Key Exchange - A New Hope , 2016, USENIX Security Symposium.
[6] Damien Stehlé,et al. Classical hardness of learning with errors , 2013, STOC '13.
[7] Martin R. Albrecht,et al. On the concrete hardness of Learning with Errors , 2015, J. Math. Cryptol..
[8] Frederik Vercauteren,et al. Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[9] Chris Peikert,et al. Public-key cryptosystems from the worst-case shortest vector problem: extended abstract , 2009, STOC '09.
[10] Johannes A. Buchmann,et al. On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack , 2016, AFRICACRYPT.
[11] Wojciech Banaszczyk,et al. Inequalities for convex bodies and polar reciprocal lattices inRn , 1995, Discret. Comput. Geom..
[12] Nicolas Gama,et al. Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds , 2016, ASIACRYPT.
[13] Christine van Vredendaal,et al. A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE , 2017, PQCrypto.
[14] Shai Halevi,et al. Algorithms in HElib , 2014, CRYPTO.
[15] Yuanmi Chen. Réduction de réseau et sécurité concrète du chiffrement complètement homomorphe , 2013 .
[16] Hao Chen,et al. Simple Encrypted Arithmetic Library - SEAL v2.1 , 2016, Financial Cryptography Workshops.
[17] Shi Bai,et al. Lattice Decoding Attacks on Binary LWE , 2014, ACISP.
[18] S. Halevi,et al. Design and Implementation of a Homomorphic-Encryption Library , 2012 .
[19] Craig Costello,et al. Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE , 2016, IACR Cryptol. ePrint Arch..
[20] Jung Hee Cheon,et al. Bootstrapping for Approximate Homomorphic Encryption , 2018, IACR Cryptol. ePrint Arch..
[21] Brent Waters,et al. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based , 2013, CRYPTO.
[22] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[23] Martin R. Albrecht. On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL , 2017, EUROCRYPT.
[24] Léo Ducas,et al. FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second , 2015, EUROCRYPT.
[25] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[26] Jung Hee Cheon,et al. Homomorphic Encryption for Arithmetic of Approximate Numbers , 2017, ASIACRYPT.
[27] Shai Halevi,et al. Bootstrapping for HElib , 2015, EUROCRYPT.
[28] Vinod Vaikuntanathan,et al. Optimized homomorphic encryption solution for secure genome-wide association studies , 2020, BMC Medical Genomics.
[29] Phong Q. Nguyen,et al. BKZ 2.0: Better Lattice Security Estimates , 2011, ASIACRYPT.
[30] Xiaoqian Jiang,et al. Secure Outsourced Matrix Computation and Application to Neural Networks , 2018, CCS.
[31] Anja Becker,et al. New directions in nearest neighbor searching with applications to lattice sieving , 2016, IACR Cryptol. ePrint Arch..
[32] Hao Chen,et al. Improved Bootstrapping for Approximate Homomorphic Encryption , 2019, IACR Cryptol. ePrint Arch..
[33] Hao Chen,et al. Homomorphic Lower Digits Removal and Improved FHE Bootstrapping , 2018, IACR Cryptol. ePrint Arch..
[34] Jung Hee Cheon,et al. Lizard: Cut off the Tail! // Practical Post-Quantum Public-Key Encryption from LWE and LWR , 2018, IACR Cryptol. ePrint Arch..
[35] Chris Peikert,et al. Better Key Sizes (and Attacks) for LWE-Based Encryption , 2011, CT-RSA.