[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …
publickey cryptographic algorithms through a public, competition-like process. The new …
Algebraically structured LWE, revisited
C Peikert, Z Pepin - Journal of Cryptology, 2024 - Springer
In recent years, there has been a proliferation of algebraically structured Learning With
Errors (LWE) variants, including Ring-LWE, Module-LWE, Polynomial-LWE, Order-LWE, and …
Errors (LWE) variants, including Ring-LWE, Module-LWE, Polynomial-LWE, Order-LWE, and …
Cryptanalysis of PLWE based on zero-trace quadratic roots
B Barbero-Lucas, I Blanco-Chacón… - arXiv preprint arXiv …, 2023 - arxiv.org
We extend two of the attacks on the PLWE problem presented in (Y. Elias, KE Lauter, E.
Ozman, and KE Stange, Ring-LWE Cryptography for the Number Theorist, in Directions in …
Ozman, and KE Stange, Ring-LWE Cryptography for the Number Theorist, in Directions in …
[PDF][PDF] RLWE/PLWE equivalence for the maximal totally real subextension of the 2rpq-th cyclotomic field.
IB Chacón, L López-Hernanz - arXiv preprint arXiv:2111.13484, 2021 - arxiv.org
arXiv:2111.13484v1 [cs.CR] 26 Nov 2021 Page 1 arXiv:2111.13484v1 [cs.CR] 26 Nov 2021
RLWE/PLWE EQUIVALENCE FOR THE MAXIMAL TOTALLY REAL SUBEXTENSION OF THE …
RLWE/PLWE EQUIVALENCE FOR THE MAXIMAL TOTALLY REAL SUBEXTENSION OF THE …
The Splitting Field of , Two-Variable NTT and Lattice-Based Cryptography
W Yang - Cryptology ePrint Archive, 2023 - eprint.iacr.org
The splitting field $ F $ of the polynomial $ Y^ n-2$ is an extension over $\mathbb {Q} $
generated by $\zeta_n=\exp (2\pi\sqrt {-1}/n) $ and $\sqrt [n]{2} $. In this paper, we lay the …
generated by $\zeta_n=\exp (2\pi\sqrt {-1}/n) $ and $\sqrt [n]{2} $. In this paper, we lay the …
Fast polynomial arithmetic in homomorphic encryption with cyclo-multiquadratic fields
I Blanco-Chacón, A Pedrouzo-Ulloa… - arXiv preprint arXiv …, 2023 - arxiv.org
We discuss the advantages and limitations of cyclotomic fields to have fast polynomial
arithmetic within homomorphic encryption, and show how these limitations can be overcome …
arithmetic within homomorphic encryption, and show how these limitations can be overcome …
[PDF][PDF] FromWeapontoTarget: QuantumComputersParadox
M Bolboceanu, S Bolos, A Coles, A Kisari… - 2024 - paper.vulsee.com
The impact of quantum computing on the classical computing based cybersecurity has been
discussed extensively over the past 30 years. This led to development of the so-called post …
discussed extensively over the past 30 years. This led to development of the so-called post …
[图书][B] Ring-LWE: Enhanced Foundations and Applications
C Lin - 2023 - search.proquest.com
Abstract Ring Learning With Errors assumption has become an important building block in
many modern cryptographic applications, such as (fully) homomorphic encryption and post …
many modern cryptographic applications, such as (fully) homomorphic encryption and post …