The Ring-LWE over two-to-power cyclotomic integer rings has been the hard computational problem for lattice cryptographic constructions. Its hardness and the conjectured hardness of approximating ideal SIVP for ideal lattices in two-to-power cyclotomic fields have been the fundamental open problems in lattice cryptography and the computational number theory. In our previous paper we presented a general theory of subset attack on the Ring-LWE with not only the Gaussian error distribution but also general error distributions. By the usage of our subset attack from sublattice quadruples we prove that the decision Ring-LWE (then the search version) over two-to-power cyclotomic integer rings with certain sufficiently large polynomially bounded ...
International audienceMost lattice-based cryptographic schemes are built upon the assumed hardness o...
Lattice-based cryptographic scheme is constructed based on hard problems on a lattice such as the sh...
The Ring Learning-With-Errors (RLWE) problem shows great promise for post-quantum cryptography and h...
We extend the known pseudorandomness of Ring-LWE to be based on lattices that do not correspond to a...
In this work, we describe an integer version of ring-LWE over the polynomial rings and prove that it...
Lattice-based cryptography is a branch of cryptography exploiting the presumed hardness of some well...
The ``learning with errors\u27\u27 (LWE) problem is to distinguish random linear equations, which ha...
Lattice-based cryptography is one of the candidates in the area of post-quantum cryptography. Crypto...
In CRYPTO 2015, Elias, Lauter, Ozman and Stange described an attack on the non-dual decision version...
Homomorphic Encryption has been considered the \u27Holy Grail of Cryptography\u27 since the discover...
Abstract. The ring and polynomial learning with errors problems (Ring-LWE and Poly-LWE) have been pr...
In this paper, we survey the status of attacks on the ring and polynomial learning with errors probl...
Abstract: A handful of recent cryptographic proposals rely on the conjectured hardness of the follow...
In this paper, we survey the status of attacks on the ring and polynomial learning with errors probl...
The hardness of finding short vectors in ideals of cyclotomic number fields (hereafter, Ideal-SVP) c...
International audienceMost lattice-based cryptographic schemes are built upon the assumed hardness o...
Lattice-based cryptographic scheme is constructed based on hard problems on a lattice such as the sh...
The Ring Learning-With-Errors (RLWE) problem shows great promise for post-quantum cryptography and h...
We extend the known pseudorandomness of Ring-LWE to be based on lattices that do not correspond to a...
In this work, we describe an integer version of ring-LWE over the polynomial rings and prove that it...
Lattice-based cryptography is a branch of cryptography exploiting the presumed hardness of some well...
The ``learning with errors\u27\u27 (LWE) problem is to distinguish random linear equations, which ha...
Lattice-based cryptography is one of the candidates in the area of post-quantum cryptography. Crypto...
In CRYPTO 2015, Elias, Lauter, Ozman and Stange described an attack on the non-dual decision version...
Homomorphic Encryption has been considered the \u27Holy Grail of Cryptography\u27 since the discover...
Abstract. The ring and polynomial learning with errors problems (Ring-LWE and Poly-LWE) have been pr...
In this paper, we survey the status of attacks on the ring and polynomial learning with errors probl...
Abstract: A handful of recent cryptographic proposals rely on the conjectured hardness of the follow...
In this paper, we survey the status of attacks on the ring and polynomial learning with errors probl...
The hardness of finding short vectors in ideals of cyclotomic number fields (hereafter, Ideal-SVP) c...
International audienceMost lattice-based cryptographic schemes are built upon the assumed hardness o...
Lattice-based cryptographic scheme is constructed based on hard problems on a lattice such as the sh...
The Ring Learning-With-Errors (RLWE) problem shows great promise for post-quantum cryptography and h...