Akiyama, Goto, Okumura, Takagi, Nuida and Hanaoka introduced an indeterminate equation analogue of learning with errors (IE-LWE) problem as a new computationally hard problem and constructed a candidate of post-quantum cryptosystem, called “Giophantus”. Giophantus satisfies the indistinguishability under chosen plaintext attack (IND-CPA) if IE-LWE problem is computationally infeasible. Akiyama et al., Shimizu and Ikematsu proposed improved Giophantus to the post-quantum standardization project. Beullens, Castryck and Vercauteren proposed an evaluation at one attack against IND-CPA security of Giophantus. However, Akiyama et al. assert that recommended parameters can resist Vercauteren et al.’s attack. Therefore, the security analysis on Gio...
In this paper, we give an attack against a public key cryptosystem based on Diophantine equations of...
Quantum computing is a significant threat to classical public-key cryptography. In strong "quantum a...
Since its proposal by Regev in 2005, the Learning With Errors (LWE) problem was used as the underlyi...
In this paper, we propose a post-quantum public-key encryption scheme whose security depends on a pr...
AbstractModern cryptography is based on various building blocks such as one way functions with or wi...
We investigate the security of a public-key encryption scheme, the Indeterminate Equation Cryptosyst...
Recently, an increasing amount of papers proposing post-quantum schemes also provide concrete parame...
\u3cp\u3eRecently, an increasing amount of papers proposing post-quantum schemes also provide concre...
Recently, an increasing amount of papers proposing post-quantum schemes also provide concrete parame...
Recently, an increasing amount of papers proposing post-quantum schemes also provide concrete parame...
Recently, an increasing amount of papers proposing post-quantum schemes also provide concrete parame...
Recently, an increasing amount of papers proposing post-quantum schemes also provide concrete parame...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
© International Association for Cryptologic Research 2019. In this paper we investigate the impact o...
Cryptosystems based on Learning with Errors or related problems are central topics in recent cryptog...
In this paper, we give an attack against a public key cryptosystem based on Diophantine equations of...
Quantum computing is a significant threat to classical public-key cryptography. In strong "quantum a...
Since its proposal by Regev in 2005, the Learning With Errors (LWE) problem was used as the underlyi...
In this paper, we propose a post-quantum public-key encryption scheme whose security depends on a pr...
AbstractModern cryptography is based on various building blocks such as one way functions with or wi...
We investigate the security of a public-key encryption scheme, the Indeterminate Equation Cryptosyst...
Recently, an increasing amount of papers proposing post-quantum schemes also provide concrete parame...
\u3cp\u3eRecently, an increasing amount of papers proposing post-quantum schemes also provide concre...
Recently, an increasing amount of papers proposing post-quantum schemes also provide concrete parame...
Recently, an increasing amount of papers proposing post-quantum schemes also provide concrete parame...
Recently, an increasing amount of papers proposing post-quantum schemes also provide concrete parame...
Recently, an increasing amount of papers proposing post-quantum schemes also provide concrete parame...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
© International Association for Cryptologic Research 2019. In this paper we investigate the impact o...
Cryptosystems based on Learning with Errors or related problems are central topics in recent cryptog...
In this paper, we give an attack against a public key cryptosystem based on Diophantine equations of...
Quantum computing is a significant threat to classical public-key cryptography. In strong "quantum a...
Since its proposal by Regev in 2005, the Learning With Errors (LWE) problem was used as the underlyi...