Several cryptosystems using structured lattices have been believed to be quantum resistant. Their security can be linked to the hardness of solving the Shortest Vector Problem over module or ideal lattices. During the past few years it has been shown that the related problem of finding a short generator of a principal ideal can be solved in quantum polynomial time over cyclotomic fields, and classical polynomial time over a range of multiquadratic and multicubic fields. Hence, it is important to study as many as possible other number fields, to improve our knowledge of the aformentioned problems. In this paper we generalise the work done over multiquadratic and multicubic fields to a larger range of real Kummer extensions of prime exponent ...
Several recent cryptographic constructions - including a public key encryption scheme, a fully homom...
Abstract. In this paper, we analyze the security of cryptosystems using short generators over ideal ...
Abstract: A handful of recent cryptographic proposals rely on the conjectured hardness of the follow...
Several cryptosystems using structured lattices have been believed to be quantum resistant. Their se...
Several cryptosystems using structured lattices have been believed to be quantum resistant. Their se...
Several cryptosystems using structured lattices have been believed to be quantum resistant. Their se...
Several cryptosystems using structured lattices have been believed to be quantum resistant. Their se...
Several cryptosystems using structured lattices have been believed to be quantum resistant. Their se...
One family of candidates to build a post-quantum cryptosystem upon relies on euclidean lattices. In ...
In this note, we describe a quantum polynomial time attack on the cryptosystems<br>based on the hard...
Abstract: A handful of recent cryptographic proposals rely on the conjectured hardness of the follow...
© 2020 A. Lesavourey et al., published by De Gruyter 2020. One family of candidates to build a post-...
A handful of recent cryptographic proposals rely on the conjectured hardness of the following proble...
The worst-case hardness of finding short vectors in ideals of cyclotomic number fields (Ideal-SVP) i...
Some recent cryptographic schemes rely on the hardness of finding a shortest generator of a principa...
Several recent cryptographic constructions - including a public key encryption scheme, a fully homom...
Abstract. In this paper, we analyze the security of cryptosystems using short generators over ideal ...
Abstract: A handful of recent cryptographic proposals rely on the conjectured hardness of the follow...
Several cryptosystems using structured lattices have been believed to be quantum resistant. Their se...
Several cryptosystems using structured lattices have been believed to be quantum resistant. Their se...
Several cryptosystems using structured lattices have been believed to be quantum resistant. Their se...
Several cryptosystems using structured lattices have been believed to be quantum resistant. Their se...
Several cryptosystems using structured lattices have been believed to be quantum resistant. Their se...
One family of candidates to build a post-quantum cryptosystem upon relies on euclidean lattices. In ...
In this note, we describe a quantum polynomial time attack on the cryptosystems<br>based on the hard...
Abstract: A handful of recent cryptographic proposals rely on the conjectured hardness of the follow...
© 2020 A. Lesavourey et al., published by De Gruyter 2020. One family of candidates to build a post-...
A handful of recent cryptographic proposals rely on the conjectured hardness of the following proble...
The worst-case hardness of finding short vectors in ideals of cyclotomic number fields (Ideal-SVP) i...
Some recent cryptographic schemes rely on the hardness of finding a shortest generator of a principa...
Several recent cryptographic constructions - including a public key encryption scheme, a fully homom...
Abstract. In this paper, we analyze the security of cryptosystems using short generators over ideal ...
Abstract: A handful of recent cryptographic proposals rely on the conjectured hardness of the follow...