Over the past decade, lattice-based cryptography has emerged as one of the most promising candidates for post-quantum public-key cryptography. For most current lattice-based schemes, one can recover the secret key by solving a corresponding instance of the unique Shortest Vector Problem (uSVP), the problem of finding a shortest non-zero vector in a lattice which is unusually short. This work is concerned with the concrete hardness of the uSVP. In particular, we study the uSVP in general as well as instances of the problem with particularly small or sparse short vectors, which are used in cryptographic constructions to increase their efficiency. We study solving the uSVP in general via lattice reduction, more precisely, the Block-wise Kork...
We construct public-key cryptosystems that are secure assuming the *worst-case* hardness of approxim...
We construct public-key cryptosystems that are secure assuming the worst-case hardness of approxi-ma...
The security of lattice-based cryptosystems such as NTRU, GGH and Ajtai-Dwork essentially relies upo...
Over the past decade, lattice-based cryptography has emerged as one of the most promising candidates...
Over the past decade, lattice-based cryptography has emerged as one of the most promising candidates...
Over the past decade, lattice-based cryptography has emerged as one of the most promising candidates...
Over the past decade, lattice-based cryptography has emerged as one of the most promising candidates...
Over the past decade, lattice-based cryptography has emerged as one of the most promising candidates...
Abstract. Building upon a famous result due to Ajtai, we propose a sequence of lattice bases with gr...
The shortest vector problem (SVP) in lattices is related to problems in combinatorial optimization, ...
With quantum-computing, classical cryptosystems, such as RSA, can easily be broken. Today, lattice-b...
With quantum-computing, classical cryptosystems, such as RSA, can easily be broken. Today, lattice-b...
One essential quest in cryptography is the search for hard instances of a given computational proble...
This paper is a tutorial introduction to the present state-of-the-art in the field of security of la...
We construct public-key cryptosystems that are secure assuming the *worst-case* hardness of approxim...
We construct public-key cryptosystems that are secure assuming the *worst-case* hardness of approxim...
We construct public-key cryptosystems that are secure assuming the worst-case hardness of approxi-ma...
The security of lattice-based cryptosystems such as NTRU, GGH and Ajtai-Dwork essentially relies upo...
Over the past decade, lattice-based cryptography has emerged as one of the most promising candidates...
Over the past decade, lattice-based cryptography has emerged as one of the most promising candidates...
Over the past decade, lattice-based cryptography has emerged as one of the most promising candidates...
Over the past decade, lattice-based cryptography has emerged as one of the most promising candidates...
Over the past decade, lattice-based cryptography has emerged as one of the most promising candidates...
Abstract. Building upon a famous result due to Ajtai, we propose a sequence of lattice bases with gr...
The shortest vector problem (SVP) in lattices is related to problems in combinatorial optimization, ...
With quantum-computing, classical cryptosystems, such as RSA, can easily be broken. Today, lattice-b...
With quantum-computing, classical cryptosystems, such as RSA, can easily be broken. Today, lattice-b...
One essential quest in cryptography is the search for hard instances of a given computational proble...
This paper is a tutorial introduction to the present state-of-the-art in the field of security of la...
We construct public-key cryptosystems that are secure assuming the *worst-case* hardness of approxim...
We construct public-key cryptosystems that are secure assuming the *worst-case* hardness of approxim...
We construct public-key cryptosystems that are secure assuming the worst-case hardness of approxi-ma...
The security of lattice-based cryptosystems such as NTRU, GGH and Ajtai-Dwork essentially relies upo...