Lattice Polly Cracker, is a public key cryptosystem that uses Gröbner bases of lattices for the preparation of the public key and normal form for decryption. In a companion paper to this one we survey the family of Polly Cracker cryptosystems, with their basic flaw that allows a “differential” attack, from which only binomial ideals are immune; we then develop the basic theory of Lattice Polly Cracker, with all the tools for efficient encryption and decryption. In this paper, after a survey of the results of the previous one, we develop all the issues connected to the security of the cryptosystem. We show that security considerations force the adoption of a very tight form of block lattice, describe the possible attacks to simplified forms ...
This paper is a tutorial introduction to the present state-of-the-art in the field of security of la...
SummaryWang et al. proposed a new hard problem on lattices which is an extension of the small intege...
It is known that the development of quantum computers will break the cryptographic schemes that are...
We shortly review the Polly Cracker family of cryptosystems. Apparently all the cryptosystems of t...
Using Gröbner bases for the construction of public key cryptosystems has been often attempted, but h...
AbstractUsing Gröbner bases for the construction of public key cryptosystems has been often attempte...
Up to now, any attempt to use Gröbner bases in the design of public key cryptosystems has failed, a...
We present the noncommutative version of the Polly Cracker cryptosystem, which is more promising tha...
Up to now, any attempt to use Gröbner bases in the design of public key cryptosystems has failed, as...
Lattice-based cryptography is an extraordinarily popular subfield of cryptography. But since it is a...
International audienceWe formally treat cryptographic constructions based on the hardness of decidin...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
One essential quest in cryptography is the search for hard instances of a given computational proble...
This paper is a tutorial introduction to the present state-of-the-art in the field of security of la...
Abstract. Micciancio defined a generalization of cyclic lattices, called ideal lattices. These latti...
This paper is a tutorial introduction to the present state-of-the-art in the field of security of la...
SummaryWang et al. proposed a new hard problem on lattices which is an extension of the small intege...
It is known that the development of quantum computers will break the cryptographic schemes that are...
We shortly review the Polly Cracker family of cryptosystems. Apparently all the cryptosystems of t...
Using Gröbner bases for the construction of public key cryptosystems has been often attempted, but h...
AbstractUsing Gröbner bases for the construction of public key cryptosystems has been often attempte...
Up to now, any attempt to use Gröbner bases in the design of public key cryptosystems has failed, a...
We present the noncommutative version of the Polly Cracker cryptosystem, which is more promising tha...
Up to now, any attempt to use Gröbner bases in the design of public key cryptosystems has failed, as...
Lattice-based cryptography is an extraordinarily popular subfield of cryptography. But since it is a...
International audienceWe formally treat cryptographic constructions based on the hardness of decidin...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
One essential quest in cryptography is the search for hard instances of a given computational proble...
This paper is a tutorial introduction to the present state-of-the-art in the field of security of la...
Abstract. Micciancio defined a generalization of cyclic lattices, called ideal lattices. These latti...
This paper is a tutorial introduction to the present state-of-the-art in the field of security of la...
SummaryWang et al. proposed a new hard problem on lattices which is an extension of the small intege...
It is known that the development of quantum computers will break the cryptographic schemes that are...