International audienceIn PKC'08, Plantard, Susilo and Win proposed a lattice-based signature scheme, whose security is based on the hardness of the closest vector problem with the infinity norm (CVP∞). This signature scheme was proposed as a countermeasure against the Nguyen-Regev attack, which improves the security and the efficiency of the Goldreich, Goldwasser and Halevi scheme (GGH). Furthermore, to resist potential side channel attacks, the authors suggested modifying the determinis-tic signing algorithm to be randomized. In this paper, we propose a chosen message attack against the randomized version. Note that the randomized signing algorithm will generate different signature vectors in a relatively small cube for the same message, s...
In this paper we revisit the modular lattice signature scheme and its efficient instantiation known ...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
Lattice signature schemes generally require particular care when it comes to preventing secret infor...
International audienceIn PKC'08, Plantard, Susilo and Win proposed a lattice-based signature scheme,...
International audienceIn PKC'08, Plantard, Susilo and Win proposed a lattice-based signature scheme,...
Lattice signature schemes generally require particular care when it comes to preventing secret infor...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece publi...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
At PKC 2008, Plantard et al. published a theoretical framework for a lattice-based signature scheme....
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
In 2012, Lyubashevsky introduced a framework for obtaining efficient digital signatures relying on l...
Lattice signature schemes generally require particular care when it comes to preventing secret infor...
In this paper we revisit the modular lattice signature scheme and its efficient instantiation known ...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
Lattice signature schemes generally require particular care when it comes to preventing secret infor...
International audienceIn PKC'08, Plantard, Susilo and Win proposed a lattice-based signature scheme,...
International audienceIn PKC'08, Plantard, Susilo and Win proposed a lattice-based signature scheme,...
Lattice signature schemes generally require particular care when it comes to preventing secret infor...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece publi...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
At PKC 2008, Plantard et al. published a theoretical framework for a lattice-based signature scheme....
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
In 2012, Lyubashevsky introduced a framework for obtaining efficient digital signatures relying on l...
Lattice signature schemes generally require particular care when it comes to preventing secret infor...
In this paper we revisit the modular lattice signature scheme and its efficient instantiation known ...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
Lattice signature schemes generally require particular care when it comes to preventing secret infor...