[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process

G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …

Algebraically structured LWE, revisited

C Peikert, Z Pepin - Journal of Cryptology, 2024 - Springer
In recent years, there has been a proliferation of algebraically structured Learning With
Errors (LWE) variants, including Ring-LWE, Module-LWE, Polynomial-LWE, Order-LWE, and …

Cryptanalysis of PLWE based on zero-trace quadratic roots

B Barbero-Lucas, I Blanco-Chacón… - arXiv preprint arXiv …, 2023 - arxiv.org
We extend two of the attacks on the PLWE problem presented in (Y. Elias, KE Lauter, E.
Ozman, and KE Stange, Ring-LWE Cryptography for the Number Theorist, in Directions in …

[PDF][PDF] RLWE/PLWE equivalence for the maximal totally real subextension of the 2rpq-th cyclotomic field.

IB Chacón, L López-Hernanz - arXiv preprint arXiv:2111.13484, 2021 - arxiv.org
arXiv:2111.13484v1 [cs.CR] 26 Nov 2021 Page 1 arXiv:2111.13484v1 [cs.CR] 26 Nov 2021
RLWE/PLWE EQUIVALENCE FOR THE MAXIMAL TOTALLY REAL SUBEXTENSION OF THE …

The Splitting Field of , Two-Variable NTT and Lattice-Based Cryptography

W Yang - Cryptology ePrint Archive, 2023 - eprint.iacr.org
The splitting field $ F $ of the polynomial $ Y^ n-2$ is an extension over $\mathbb {Q} $
generated by $\zeta_n=\exp (2\pi\sqrt {-1}/n) $ and $\sqrt [n]{2} $. In this paper, we lay the …

Fast polynomial arithmetic in homomorphic encryption with cyclo-multiquadratic fields

I Blanco-Chacón, A Pedrouzo-Ulloa… - arXiv preprint arXiv …, 2023 - arxiv.org
We discuss the advantages and limitations of cyclotomic fields to have fast polynomial
arithmetic within homomorphic encryption, and show how these limitations can be overcome …

[PDF][PDF] FromWeapontoTarget: QuantumComputersParadox

M Bolboceanu, S Bolos, A Coles, A Kisari… - 2024 - paper.vulsee.com
The impact of quantum computing on the classical computing based cybersecurity has been
discussed extensively over the past 30 years. This led to development of the so-called post …

[图书][B] Ring-LWE: Enhanced Foundations and Applications

C Lin - 2023 - search.proquest.com
Abstract Ring Learning With Errors assumption has become an important building block in
many modern cryptographic applications, such as (fully) homomorphic encryption and post …