We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Attack on lattice shortest vector problem using K-Nearest Neighbour

    Lattice-based cryptography is now the most effective and adaptable branch of post-quantum cryptography. The prime number factoring assumption or the...

    Shaurya Pratap Singh, Brijesh Kumar Chaurasia, ... Siddharth Gupta in Iran Journal of Computer Science
    Article 04 May 2024
  2. Hull Attacks on the Lattice Isomorphism Problem

    The lattice isomorphism problem (LIP) asks one to find an isometry between two lattices. It has recently been proposed as a foundation for...
    Léo Ducas, Shane Gibbons in Public-Key Cryptography – PKC 2023
    Conference paper 2023
  3. Lattice codes for lattice-based PKE

    Existing error correction mechanisms in lattice-based public key encryption (PKE) rely on either trivial modulation or its concatenation with error...

    Shanxiang Lyu, Ling Liu, ... Hao Chen in Designs, Codes and Cryptography
    Article 16 November 2023
  4. Lattice basis reduction techniques

    In recent years, there has been a significant amount of work conducted in the field of Lattice Basis Reduction Techniques, which is one of the...

    Ajay Dabral, S. K. Pal, Arvind Yadav in Multimedia Tools and Applications
    Article 01 February 2024
  5. The Lattice Overparametrization Paradigm for the Machine Learning of Lattice Operators

    The machine learning of lattice operators has three possible bottlenecks. From a statistical standpoint, it is necessary to design a constrained...
    Diego Marcondes, Junior Barrera in Discrete Geometry and Mathematical Morphology
    Conference paper 2024
  6. Lattice-based Cryptography

    This chapter has an overview of lattice-based cryptography. You learn why lattices are important in cryptography and their challenges. Furthermore,...
    Marius Iulian Mihailescu, Stefania Loredana Nita in Pro Cryptography and Cryptanalysis with C++23
    Chapter 2023
  7. Security Evaluation on KpqC Round 1 Lattice-Based Algorithms Using Lattice Estimator

    Post-quantum cryptography is expected to become one of the fundamental technologies in the field of security that requires public-key cryptosystems,...
    Suhri Kim, Eunmin Lee, ... Hyuna Noh in Information Security and Cryptology – ICISC 2023
    Conference paper 2024
  8. A New Self-dual BKZ Algorithm Based on Lattice Sieving

    Lattice reduction algorithm is an important algorithm for solving lattice Shortest Vector Problem (SVP), which makes it the primary tool for...
    **xuan Deng, Huiwen Jia in Frontiers in Cyber Security
    Conference paper 2024
  9. On the Lattice Isomorphism Problem, Quadratic Forms, Remarkable Lattices, and Cryptography

    A natural and recurring idea in the knapsack/lattice cryptography literature is to start from a lattice with remarkable decoding capability as your...
    Léo Ducas, Wessel van Woerden in Advances in Cryptology – EUROCRYPT 2022
    Conference paper 2022
  10. Lattice-Based Programmable Hash Functions and Applications

    Driven by the open problem raised by Hofheinz and Kiltz (J Cryptol 25(3):484–527, 2012), we study the formalization of lattice-based programmable...

    Jiang Zhang, Yu Chen, Zhenfeng Zhang in Journal of Cryptology
    Article 29 November 2023
  11. A survey on lattice-based digital signature

    Lattice-based digital signature has become one of the widely recognized post-quantum algorithms because of its simple algebraic operation, rich...

    Fengxia Liu, Zhiyong Zheng, ... Qun Xu in Cybersecurity
    Article Open access 01 April 2024
  12. Hesitant fuzzy three-way concept lattice and its attribute reduction

    Formal concept analysis is a widely studied mathematical tool for performing data analysis and processing. Three-way decision is a model of decision...

    Jun Zhang, Qian Hu, ... Chao Fu in Applied Intelligence
    Article 16 February 2024
  13. Quantum Augmented Lattice Attack on NTRU with Side Information

    NTRU is one of the most important lattice-based public key cryptosystems, and a potential candidate for post-quantum cryptography. This paper derives...
    Qingfeng Cheng, **zheng Cao, **angyang Luo in Information Security and Cryptology
    Conference paper 2024
  14. Forward Security of Fiat-Shamir Lattice Signatures

    Forward security is a desirable property for lattice-based signatures, which was posed by NIST PQC standardization against secret key exposures. The...
    Yang Tao, Rui Zhang, Yunfeng Ji in Applied Cryptography and Network Security
    Conference paper 2023
  15. A Lattice Attack on CRYSTALS-Kyber with Correlation Power Analysis

    CRYSTALS-Kyber is a key-encapsulation mechanism, whose security is based on the hardness of solving the learning-with-errors (LWE) problem over...
    Yen-Ting Kuo, Atsushi Takayasu in Information Security and Cryptology – ICISC 2023
    Conference paper 2024
  16. Concrete Analysis of Quantum Lattice Enumeration

    Lattice reduction algorithms such as BKZ (Block-Korkine-Zolotarev) play a central role in estimating the security of lattice-based cryptography. The...
    Shi Bai, Maya-Iggy van Hoof, ... Tran Ngo in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  17. Lattice-Based Threshold, Accountable, and Private Signature

    Recently, Boneh and Komlo (CRYPTO 2022) initiated the study of threshold, accountable, and private signature (TAPS) schemes. Classical threshold...
    Yingfei Yan, Yongjun Zhao, ... Baocang Wang in Topics in Cryptology – CT-RSA 2024
    Conference paper 2024
  18. Lattice Linearity of Multiplication and Modulo

    In this paper, we study the lattice linearity of multiplication and modulo operations. We demonstrate that these operations are lattice linear and...
    Arya Tanmay Gupta, Sandeep S. Kulkarni in Stabilization, Safety, and Security of Distributed Systems
    Conference paper 2023
  19. Sequential Half-Aggregation of Lattice-Based Signatures

    With  \(\textsf {Dilithium} \) and...
    Katharina Boudgoust, Akira Takahashi in Computer Security – ESORICS 2023
    Conference paper 2024
  20. Cryptanalysis of Short and Provable Secure Lattice-Based Signature Scheme

    Fenghe and Zhenhua proposed a short and provable secure lattice-based signature scheme in the standard model in 2016. Their aim was to construct a...
    Ramakant Kumar, Sahadeo Padhye, Swati Rawal in Security, Privacy, and Applied Cryptography Engineering
    Conference paper 2024
Did you find what you were looking for? Share feedback.