Search
Search Results
-
Attack on lattice shortest vector problem using K-Nearest Neighbour
Lattice-based cryptography is now the most effective and adaptable branch of post-quantum cryptography. The prime number factoring assumption or the...
-
Hull Attacks on the Lattice Isomorphism Problem
The lattice isomorphism problem (LIP) asks one to find an isometry between two lattices. It has recently been proposed as a foundation for... -
Lattice codes for lattice-based PKE
Existing error correction mechanisms in lattice-based public key encryption (PKE) rely on either trivial modulation or its concatenation with error...
-
Lattice basis reduction techniques
In recent years, there has been a significant amount of work conducted in the field of Lattice Basis Reduction Techniques, which is one of the...
-
The Lattice Overparametrization Paradigm for the Machine Learning of Lattice Operators
The machine learning of lattice operators has three possible bottlenecks. From a statistical standpoint, it is necessary to design a constrained... -
Lattice-based Cryptography
This chapter has an overview of lattice-based cryptography. You learn why lattices are important in cryptography and their challenges. Furthermore,... -
Security Evaluation on KpqC Round 1 Lattice-Based Algorithms Using Lattice Estimator
Post-quantum cryptography is expected to become one of the fundamental technologies in the field of security that requires public-key cryptosystems,... -
A New Self-dual BKZ Algorithm Based on Lattice Sieving
Lattice reduction algorithm is an important algorithm for solving lattice Shortest Vector Problem (SVP), which makes it the primary tool for... -
On the Lattice Isomorphism Problem, Quadratic Forms, Remarkable Lattices, and Cryptography
A natural and recurring idea in the knapsack/lattice cryptography literature is to start from a lattice with remarkable decoding capability as your... -
Lattice-Based Programmable Hash Functions and Applications
Driven by the open problem raised by Hofheinz and Kiltz (J Cryptol 25(3):484–527, 2012), we study the formalization of lattice-based programmable...
-
A survey on lattice-based digital signature
Lattice-based digital signature has become one of the widely recognized post-quantum algorithms because of its simple algebraic operation, rich...
-
Hesitant fuzzy three-way concept lattice and its attribute reduction
Formal concept analysis is a widely studied mathematical tool for performing data analysis and processing. Three-way decision is a model of decision...
-
Quantum Augmented Lattice Attack on NTRU with Side Information
NTRU is one of the most important lattice-based public key cryptosystems, and a potential candidate for post-quantum cryptography. This paper derives... -
Forward Security of Fiat-Shamir Lattice Signatures
Forward security is a desirable property for lattice-based signatures, which was posed by NIST PQC standardization against secret key exposures. The... -
A Lattice Attack on CRYSTALS-Kyber with Correlation Power Analysis
CRYSTALS-Kyber is a key-encapsulation mechanism, whose security is based on the hardness of solving the learning-with-errors (LWE) problem over... -
Concrete Analysis of Quantum Lattice Enumeration
Lattice reduction algorithms such as BKZ (Block-Korkine-Zolotarev) play a central role in estimating the security of lattice-based cryptography. The... -
Lattice-Based Threshold, Accountable, and Private Signature
Recently, Boneh and Komlo (CRYPTO 2022) initiated the study of threshold, accountable, and private signature (TAPS) schemes. Classical threshold... -
Lattice Linearity of Multiplication and Modulo
In this paper, we study the lattice linearity of multiplication and modulo operations. We demonstrate that these operations are lattice linear and... -
Sequential Half-Aggregation of Lattice-Based Signatures
With \(\textsf {Dilithium} \) and... -
Cryptanalysis of Short and Provable Secure Lattice-Based Signature Scheme
Fenghe and Zhenhua proposed a short and provable secure lattice-based signature scheme in the standard model in 2016. Their aim was to construct a...