In a recent paper, Aggarwal, Joux, Prakash, and Santha (AJPS) describe an ingenious public-key cryptosystem mimicking NTRU over the integers. This algorithm relies on the properties of Mersenne primes instead of polynomial rings. The security of the AJPS cryptosystem relies on the conjectured hardness of the Mersenne Low Hamming Ratio Assumption, defined in [AJPS]. This work shows that AJPS\u27 security estimates are too optimistic and describes an algorithm allowing to recover the secret key from the public key much faster than foreseen in [AJPS]. In particular, our algorithm is \emph{experimentally practical} (within the reach of the computational capabilities of a large organization), at least for the parameter choice $\{n=1279,h=17\}$...
The Naccache–Stern public-key cryptosystem (NS) relies on the conjectured hardness of the modular mu...
Cryptographic algorithms are oftenly based on large prime numbers. It is a difficult task to generat...
The LWE problem is one of the prime candidates for building the most efficient post-quantum secure p...
In 2017, Aggarwal, Joux, Prakash, and Santha proposed an innovative NTRU-like public-key cryptosyste...
In [AJPS17], Aggarwal, Joux, Prakash & Santha described an elegant public-key cryptosystem (AJPS-1) ...
In this work, we propose a new public-key cryptosystem whose security is based on the computational ...
Aggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cry...
peer reviewedAt Crypto 2018, Aggarwal, Joux, Prakash and Santha (AJPS) described a new public-key e...
D. Aggarwal and others have recently proposed a new quantum-resistant asymmetric cryptosystem AJPS [...
At Crypto 2018, Aggarwal, Joux, Prakash and Santha (AJPS) described a new public-key encryption sche...
AbstractIn this paper, the authors give the definitions of a coprime sequence and a lever function, ...
We introduce a general framework encompassing the main hard problems emerging in lattice-based crypt...
International audienceLet (n = pq, e = n^β) be an RSA public key with private exponent d = n^δ , whe...
Our research led to the discovery of an asymmetric encryption algorithm that follows Kerckhoff\u27s ...
We construct three public key knapsack cryptosystems. Standard knapsack cryptosystems hide easy inst...
The Naccache–Stern public-key cryptosystem (NS) relies on the conjectured hardness of the modular mu...
Cryptographic algorithms are oftenly based on large prime numbers. It is a difficult task to generat...
The LWE problem is one of the prime candidates for building the most efficient post-quantum secure p...
In 2017, Aggarwal, Joux, Prakash, and Santha proposed an innovative NTRU-like public-key cryptosyste...
In [AJPS17], Aggarwal, Joux, Prakash & Santha described an elegant public-key cryptosystem (AJPS-1) ...
In this work, we propose a new public-key cryptosystem whose security is based on the computational ...
Aggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cry...
peer reviewedAt Crypto 2018, Aggarwal, Joux, Prakash and Santha (AJPS) described a new public-key e...
D. Aggarwal and others have recently proposed a new quantum-resistant asymmetric cryptosystem AJPS [...
At Crypto 2018, Aggarwal, Joux, Prakash and Santha (AJPS) described a new public-key encryption sche...
AbstractIn this paper, the authors give the definitions of a coprime sequence and a lever function, ...
We introduce a general framework encompassing the main hard problems emerging in lattice-based crypt...
International audienceLet (n = pq, e = n^β) be an RSA public key with private exponent d = n^δ , whe...
Our research led to the discovery of an asymmetric encryption algorithm that follows Kerckhoff\u27s ...
We construct three public key knapsack cryptosystems. Standard knapsack cryptosystems hide easy inst...
The Naccache–Stern public-key cryptosystem (NS) relies on the conjectured hardness of the modular mu...
Cryptographic algorithms are oftenly based on large prime numbers. It is a difficult task to generat...
The LWE problem is one of the prime candidates for building the most efficient post-quantum secure p...