The dual attack has long been considered a relevant attack on lattice-based cryptographic schemes relying on the hardness of learning with errors (LWE) and its structured variants. As solving LWE corresponds to finding a nearest point on a lattice, one may naturally wonder how efficient this dual approach is for solving more general closest vector problems, such as the classical closest vector problem (CVP), the variants bounded distance decoding (BDD) and approximate CVP, and preprocessing versions of these problems. While primal, sieving-based solutions to these problems (with preprocessing) were recently studied in a series of works on approximate Voronoi cells [Laa16b, DLdW19, Laa20, DLvW20], for the dual attack no such overview exists,...
Many of the leading post-quantum key exchange and signature schemes rely on the conjectured hardness...
Many of the leading post-quantum key exchange and signature schemes rely on the conjectured hardness...
Dual attacks aiming at decoding generic linear codes have been found recently to outperform for cert...
\u3cp\u3eThe two traditional hard problems underlying the security of lattice-based cryptography are...
The two traditional hard problems underlying the security of lattice-based cryptography are the shor...
We present a new efficient algorithm for the search version of the approximate Closest Vec-tor Probl...
The two traditional hard problems underlying the security of lattice-based cryptography are the shor...
The two traditional hard problems underlying the security of lattice-based cryptography are the shor...
The two traditional hard problems underlying the security of lattice-based cryptography are the shor...
Lattice-based cryptography has recently emerged as a prime candidate for efficient and secure post-q...
Lattice-based cryptography has recently emerged as a prime candidate for efficient and secure post-q...
Cryptosystems based on the learning with errors (LWE) problem are assigned a security level that rel...
Cryptosystems based on the learning with errors (LWE) problem are assigned a security level that rel...
textabstractWe present a new efficient algorithm for the search version of the approximate Closest V...
We present a new efficient algorithm for the search version of the approximate Closest Vector Proble...
Many of the leading post-quantum key exchange and signature schemes rely on the conjectured hardness...
Many of the leading post-quantum key exchange and signature schemes rely on the conjectured hardness...
Dual attacks aiming at decoding generic linear codes have been found recently to outperform for cert...
\u3cp\u3eThe two traditional hard problems underlying the security of lattice-based cryptography are...
The two traditional hard problems underlying the security of lattice-based cryptography are the shor...
We present a new efficient algorithm for the search version of the approximate Closest Vec-tor Probl...
The two traditional hard problems underlying the security of lattice-based cryptography are the shor...
The two traditional hard problems underlying the security of lattice-based cryptography are the shor...
The two traditional hard problems underlying the security of lattice-based cryptography are the shor...
Lattice-based cryptography has recently emerged as a prime candidate for efficient and secure post-q...
Lattice-based cryptography has recently emerged as a prime candidate for efficient and secure post-q...
Cryptosystems based on the learning with errors (LWE) problem are assigned a security level that rel...
Cryptosystems based on the learning with errors (LWE) problem are assigned a security level that rel...
textabstractWe present a new efficient algorithm for the search version of the approximate Closest V...
We present a new efficient algorithm for the search version of the approximate Closest Vector Proble...
Many of the leading post-quantum key exchange and signature schemes rely on the conjectured hardness...
Many of the leading post-quantum key exchange and signature schemes rely on the conjectured hardness...
Dual attacks aiming at decoding generic linear codes have been found recently to outperform for cert...