A Subfield Lattice Attack on Overstretched NTRU Assumptions
Top Cited Papers
- 21 July 2016
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 38 references indexed in Scilit:
- Provably Weak Instances of Ring-LWE RevisitedPublished by Springer Science and Business Media LLC ,2016
- Recovering Short Generators of Principal Ideals in Cyclotomic RingsPublished by Springer Science and Business Media LLC ,2016
- Implementing Candidate Graded Encoding Schemes from Ideal LatticesLecture Notes in Computer Science, 2015
- Efficient quantum algorithms for computing class groups and solving the principal ideal problem in arbitrary degree number fieldsPublished by Society for Industrial & Applied Mathematics (SIAM) ,2015
- Subexponential time relations in the class group of large degree number fieldsAdvances in Mathematics of Communications, 2014
- Subexponential class group and unit group computation in large degree number fieldsLMS Journal of Computation and Mathematics, 2014
- Improved Security for a Ring-Based Fully Homomorphic Encryption SchemeLecture Notes in Computer Science, 2013
- Practical Multilinear Maps over the IntegersLecture Notes in Computer Science, 2013
- Efficient Fully Homomorphic Encryption from (Standard) LWEPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- BKZ 2.0: Better Lattice Security EstimatesLecture Notes in Computer Science, 2011