Results 11 to 20 of about 2,659 (196)

Provably weak instances of ring-LWE revisited [PDF]

open access: yes, 2016
In CRYPTO 2015, Elias, Lauter, Ozman and Stange described an attack on the non-dual decision version of the ring learning with errors problem (RLWE) for two special families of defining polynomials, whose construction depends on the modulus q that is ...
J Hoffstein   +9 more
core   +5 more sources

Ring-LWE Cryptography for the Number Theorist [PDF]

open access: yes, 2015
In this paper, we survey the status of attacks on the ring and polynomial learning with errors problems (RLWE and PLWE). Recent work on the security of these problems [Eisentr\"ager-Hallgren-Lauter, Elias-Lauter-Ozman-Stange] gives rise to interesting ...
Elias, Yara   +3 more
core   +5 more sources

Obfuscating Conjunctions under Entropic Ring LWE [PDF]

open access: yesProceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016
We show how to securely obfuscate conjunctions, which are functions f(x[subscript 1], . . . , x[subscript n]) = ∧[subscript i∈I] y[superscript i] where I ⊆ [n] and each literal y[subscript i] is either just x[subscript i] or ¬x[subscript i] e.g., f(x ...
Brakerski, Zvika   +3 more
core   +8 more sources

Additively homomorphic ring-LWE masking [PDF]

open access: yes, 2016
In this paper, we present a new masking scheme for ring LWE decryption. Our scheme exploits the additively-homomorphic property of the existing ring-LWE encryption schemes and computes an additive-mask as an encryption of a random message.
de Clercq, Ruan   +4 more
core   +3 more sources

(In)Security of Ring-LWE Under Partial Key Exposure

open access: yesJournal of Mathematical Cryptology, 2020
We initiate the study of partial key exposure in Ring-LWE (RLWE)-based cryptosystems. Specifically, we (1) Introduce the search and decision Leaky R-LWE assumptions (Leaky R-SLWE, Leaky R-DLWE), to formalize the hardness of search/decision RLWE under ...
Dachman-Soled Dana   +3 more
doaj   +3 more sources

Towards a Ring Analogue of the Leftover Hash Lemma [PDF]

open access: yesJournal of Mathematical Cryptology, 2020
The leftover hash lemma (LHL) is used in the analysis of various lattice-based cryptosystems, such as the Regev and Dual-Regev encryption schemes as well as their leakage-resilient counterparts. The LHL does not hold in the ring setting, when the ring is
Dachman-Soled Dana   +3 more
doaj   +3 more sources

Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts [PDF]

open access: yes, 2017
We provide a tight security proof for an IND-CCA Ring-LWE based Key Encapsulation Mechanism that is derived from a generic construction of Dent (IMA Cryptography and Coding, 2003). Such a tight reduction is not known for the generic construction.
AW Dent   +23 more
core   +4 more sources

Practical CCA2-Secure and Masked Ring-LWE Implementation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
During the last years public-key encryption schemes based on the hardness of ring-LWE have gained significant popularity. For real-world security applications assuming strong adversary models, a number of practical issues still need to be addressed.
Tobias Oder   +3 more
doaj   +4 more sources

Large Modulus Ring-LWE > Module-LWE [PDF]

open access: yes, 2017
We present a reduction from the module learning with errors problem (MLWE) in dimension \(d\) and with modulus \(q\) to the ring learning with errors problem (RLWE) with modulus \(q^{d}\). Our reduction increases the LWE error rate \(\alpha \) by a quadratic factor in the ring dimension \(n\) and a square root in the module rank \(d\) for power-of-two ...
Albrecht, Martin, Deo, Amit
core   +2 more sources

Characterizing Disease Severity Through Surgical Recurrence Rates in Idiopathic Subglottic Stenosis. [PDF]

open access: yesLaryngoscope
The following investigation examined endoscopic surgical interval rates across a patient with idiopathic subglottic stenosis (iSGS) first 2 years of treatment compared to their last 3 years of treatment over a total of 5 years of follow up. Through comparison of these two intervals a disease severity classification for iSGS based on decreasing ...
Bowen AJ   +15 more
europepmc   +2 more sources

Home - About - Disclaimer - Privacy