The “Multivariate Ring Learning with Errors” problem was presented as a generalization of Ring Learning with Errors (RLWE), introducing efficiency improvements with respect to the RLWE counterpart thanks to its multivariate structure. Nevertheless, the recent attack presented by Bootland, Castryck and Vercauteren has some important consequences on the security of the multivariate RLWE problem with “non-coprime” cyclotomics; this attack transforms instances of m-RLWE with power-of-two cyclotomic polynomials of degree n=∏ini into a set of RLWE samples with dimension maxi{ni}. This is especially devastating for low-degree cyclotomics (e.g., Φ4(x)=1+x2). In this work, we revisit the security of multivariate RLWE and propose new alternative inst...
Abstract. We describe a new attack on the Search Ring Learning-With-Errors (RLWE) problem based on t...
The Ring Learning with Errors (RLWE) problem has become one of the most widely used cryptographic as...
Several works have characterized weak instances of the Ring-LWE problem by exploring vulnerabilities...
The “Multivariate Ring Learning with Errors” problem was presented as a generalization of Ring Learn...
The “Multivariate Ring Learning with Errors” problem was presented as a generalization of Ring Learn...
Abstract. The ring and polynomial learning with errors problems (Ring-LWE and Poly-LWE) have been pr...
© International Association for Cryptologic Research 2016. In CRYPTO 2015, Elias, Lauter, Ozman and ...
The Learning with Errors (LWE) problem is the fundamental backbone of modern lattice-based cryptogra...
In this paper, we survey the status of attacks on the ring and polynomial learning with errors probl...
In this paper, we survey the status of attacks on the ring and polynomial learning with errors probl...
Lattice-based cryptography relies in great parts on the use of the Learning With Errors (LWE) proble...
The ring variant of learning with errors (Ring-LWE) problem has provided efficient post-quantum cryp...
We describe a decisional attack against a version of the PLWE problem in which the samples are take...
International audienceThe "learning with errors" (LWE) problem is to distinguish random linear equat...
International audienceSeveral recent proposals of efficient public-key encryption are based on varia...
Abstract. We describe a new attack on the Search Ring Learning-With-Errors (RLWE) problem based on t...
The Ring Learning with Errors (RLWE) problem has become one of the most widely used cryptographic as...
Several works have characterized weak instances of the Ring-LWE problem by exploring vulnerabilities...
The “Multivariate Ring Learning with Errors” problem was presented as a generalization of Ring Learn...
The “Multivariate Ring Learning with Errors” problem was presented as a generalization of Ring Learn...
Abstract. The ring and polynomial learning with errors problems (Ring-LWE and Poly-LWE) have been pr...
© International Association for Cryptologic Research 2016. In CRYPTO 2015, Elias, Lauter, Ozman and ...
The Learning with Errors (LWE) problem is the fundamental backbone of modern lattice-based cryptogra...
In this paper, we survey the status of attacks on the ring and polynomial learning with errors probl...
In this paper, we survey the status of attacks on the ring and polynomial learning with errors probl...
Lattice-based cryptography relies in great parts on the use of the Learning With Errors (LWE) proble...
The ring variant of learning with errors (Ring-LWE) problem has provided efficient post-quantum cryp...
We describe a decisional attack against a version of the PLWE problem in which the samples are take...
International audienceThe "learning with errors" (LWE) problem is to distinguish random linear equat...
International audienceSeveral recent proposals of efficient public-key encryption are based on varia...
Abstract. We describe a new attack on the Search Ring Learning-With-Errors (RLWE) problem based on t...
The Ring Learning with Errors (RLWE) problem has become one of the most widely used cryptographic as...
Several works have characterized weak instances of the Ring-LWE problem by exploring vulnerabilities...