The Dual-Sieve Attack on Learning with Errors (LWE), or more generally Bounded Distance Decoding (BDD), has seen many improvements in the recent years, and ultimately led to claims that it outperforms the primal attack against certain lattice-based schemes in the PQC standardization process organised by NIST. However, the work of Ducas--Pulles (Crypto \u2723) revealed that the so-called Independence Heuristic , which all recent dual attacks used, leads to wrong predictions in a contradictory regime, which is relevant for the security of cryptoschemes. More specifically, the stated distributions of scores for the actual solution and for incorrect candidates were both incorrect. In this work, we propose to use the weaker heuristic that the ...
Security parameters and attack countermeasures for Lattice-based cryptosystems have not yet matured ...
The Learning with Errors (LWE) problem has gained a lot of attention in recent years leading to a se...
In this paper, we investigate the security of the Learning With Error (LWE) problem with small secre...
Guo and Johansson (ASIACRYPT 2021), and MATZOV (tech. report 2022) have independently claimed improv...
Learning with Errors (LWE) is an important problem for post-quantum cryptography (PQC) that underlin...
Many of the leading post-quantum key exchange and signature schemes rely on the conjectured hardness...
The dual attack has long been considered a relevant attack on lattice-based cryptographic schemes re...
In CRYPTO 2015, Elias, Lauter, Ozman and Stange described an attack on the non-dual decision version...
Dual attacks aiming at decoding generic linear codes have been found recently to outperform for cert...
In post-quantum cryptography, Learning With Errors (LWE) is one of the dominant underlying mathemati...
The Learning with Errors (LWE) problem is one of the most prominent problems in lattice-based crypto...
Abstract. In security proofs of lattice based cryptography, bounding the closeness of two probabilit...
Cryptosystems based on the learning with errors (LWE) problem are assigned a security level that rel...
This paper presents an attack against common procedures for comparing the size-security tradeoffs of...
The Distorted Bounded Distance Decoding Problem (DBDD) was introduced by Dachman-Soled et al. [Crypt...
Security parameters and attack countermeasures for Lattice-based cryptosystems have not yet matured ...
The Learning with Errors (LWE) problem has gained a lot of attention in recent years leading to a se...
In this paper, we investigate the security of the Learning With Error (LWE) problem with small secre...
Guo and Johansson (ASIACRYPT 2021), and MATZOV (tech. report 2022) have independently claimed improv...
Learning with Errors (LWE) is an important problem for post-quantum cryptography (PQC) that underlin...
Many of the leading post-quantum key exchange and signature schemes rely on the conjectured hardness...
The dual attack has long been considered a relevant attack on lattice-based cryptographic schemes re...
In CRYPTO 2015, Elias, Lauter, Ozman and Stange described an attack on the non-dual decision version...
Dual attacks aiming at decoding generic linear codes have been found recently to outperform for cert...
In post-quantum cryptography, Learning With Errors (LWE) is one of the dominant underlying mathemati...
The Learning with Errors (LWE) problem is one of the most prominent problems in lattice-based crypto...
Abstract. In security proofs of lattice based cryptography, bounding the closeness of two probabilit...
Cryptosystems based on the learning with errors (LWE) problem are assigned a security level that rel...
This paper presents an attack against common procedures for comparing the size-security tradeoffs of...
The Distorted Bounded Distance Decoding Problem (DBDD) was introduced by Dachman-Soled et al. [Crypt...
Security parameters and attack countermeasures for Lattice-based cryptosystems have not yet matured ...
The Learning with Errors (LWE) problem has gained a lot of attention in recent years leading to a se...
In this paper, we investigate the security of the Learning With Error (LWE) problem with small secre...