Quantum Key Search for Ternary LWE [PDF]
Ternary LWE, i.e., LWE with coefficients of the secret and the error vectors taken from $\{-1, 0, 1\}$, is a popular choice among NTRU-type cryptosystems and some signatures schemes like BLISS and GLP.
Alexander May +2 more
core +2 more sources
Efficient isochronous fixed-weight sampling with applications to NTRU [PDF]
We present a solution to the open problem of designing a linear-time, unbiased and timing attack-resistant shuffling algorithm for fixed-weight sampling.
Décio Luiz Gazzoni Filho +2 more
core +5 more sources
DAWN: Smaller and Faster NTRU Encryption via Double Encoding [PDF]
This paper introduces DAWN, a compact and efficient NTRU encryption utilizing double encoding, which is provably secure under the NTRU assumption and the Ring-LWE assumption.
Xianhui Lu +4 more
core +2 more sources
Too Many Hints - When LLL Breaks LWE [PDF]
All modern lattice-based schemes build on variants of the LWE problem. Information leakage of the LWE secret $\mathbf s \in \mathbb{Z}_q^n$ is usually modeled via so-called hints, i.e., inner products of $\mathbf s$ with some (random, but known) vector.
Alexander May, Julian Nowakowski
core
Efficiently Masking Polynomial Inversion at Arbitrary Order [PDF]
Physical side-channel analysis poses a huge threat to post-quantum cryptographic schemes implemented on embedded devices. Still, secure implementations are missing for many schemes.
Georg Land +3 more
core
Post-quantum cryptographic algorithm identification using machine learning [PDF]
This research presents a study on the identification of post-quantum cryptography algorithms through machine learning techniques. Plain text files were encoded by four postquantum algorithms, participating in NIST's post-quantum cryptography ...
Rocha, Bruno dos Santos
core
Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS\u2715 [PDF]
In ASIACCS 2015, Nuñez, Agudo, and Lopez proposed a proxy re-encryption scheme, NTRUReEncrypt, based on NTRU, which allows a proxy to translate ciphertext under the delegator\u27s public key into a re-encrypted ciphertext that can be decrypted correctly ...
A Hülsing +10 more
core +1 more source
Implementation and Benchmarking of Round 2 Candidates in the NIST Post-Quantum Cryptography Standardization Process Using Hardware and Software/Hardware Co-design Approaches [PDF]
Performance in hardware has typically played a major role in differentiating among leading candidates in cryptographic standardization efforts. Winners of two past NIST cryptographic contests (Rijndael in case of AES and Keccak in case of SHA-3) were ...
Duc Tri Nguyen +5 more
core
A Thorough Treatment of Highly-Efficient NTRU Instantiations [PDF]
Cryptography based on the hardness of lattice problems over polynomial rings currently provides the most practical solution for public key encryption in the quantum era. The first encryption scheme utilizing properties of polynomial rings was NTRU (ANTS
Dominique Unruh +5 more
core
Message Recovery Attack in NTRU through VFK Lattices
In the present paper, we implement a message recovery attack to all variants of the NTRU cryptosystem. Our approach involves a reduction from the NTRU-lattice to a Voronoi First Kind lattice, enabling the application of a polynomial CVP exact algorithm ...
Adamoudis, Marios +3 more
core

