Practical Analysis of Key Recovery Attack Against Search-LWE Problem
暂无分享,去创建一个
Yang Guo | Masaya Yasuda | Junpei Yamaguchi | Momonari Kudo | Masaya Yasuda | Momonari Kudo | Junpei Yamaguchi | Yang Guo
[1] Martin R. Albrecht,et al. On the concrete hardness of Learning with Errors , 2015, J. Math. Cryptol..
[2] Ronitt Rubinfeld,et al. On the learnability of discrete distributions , 1994, STOC '94.
[3] Chris Peikert,et al. Public-key cryptosystems from the worst-case shortest vector problem: extended abstract , 2009, STOC '09.
[4] Nicolas Gama,et al. Predicting Lattice Reduction , 2008, EUROCRYPT.
[5] Martin R. Albrecht,et al. Algebraic algorithms for LWE problems , 2015, ACCA.
[6] Mingjie Liu,et al. Solving BDD by Enumeration: An Update , 2013, CT-RSA.
[7] Chris Peikert,et al. Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller , 2012, IACR Cryptol. ePrint Arch..
[8] László Babai,et al. On Lovász’ lattice reduction and the nearest lattice point problem , 1986, Comb..
[9] Brent Waters,et al. Lossy Trapdoor Functions and Their Applications , 2011, SIAM J. Comput..
[10] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2009, JACM.
[11] Dan Boneh,et al. Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes , 1996, CRYPTO.
[12] Martin R. Albrecht,et al. On the complexity of the BKW algorithm on LWE , 2012, Des. Codes Cryptogr..
[13] Oded Regev,et al. Lattice-Based Cryptography , 2006, CRYPTO.
[14] Claus-Peter Schnorr,et al. Lattice basis reduction: Improved practical algorithms and solving subset sum problems , 1991, FCT.
[15] Kim Laine,et al. Key Recovery for LWE in Polynomial Time , 2015, IACR Cryptol. ePrint Arch..
[16] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[17] Claus-Peter Schnorr,et al. Lattice Reduction by Random Sampling and Birthday Methods , 2003, STACS.
[18] Chris Peikert,et al. Better Key Sizes (and Attacks) for LWE-Based Encryption , 2011, CT-RSA.
[19] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[20] Phong Q. Nguyen,et al. BKZ 2.0: Better Lattice Security Estimates , 2011, ASIACRYPT.
[21] László Lovász,et al. Factoring polynomials with rational coefficients , 1982 .
[22] Sanjeev Arora,et al. New Algorithms for Learning in Presence of Errors , 2011, ICALP.
[23] Steven D. Galbraith,et al. Mathematics of Public Key Cryptography , 2012 .
[24] Damien Stehlé,et al. Classical hardness of learning with errors , 2013, STOC '13.
[25] Craig Gentry,et al. Graph-Induced Multilinear Maps from Lattices , 2015, TCC.
[26] Vinod Vaikuntanathan,et al. Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages , 2011, CRYPTO.