“…This may be seen as the first theoretical evidence that, at least when using a small modulus q, restricting the ∞ norm of the solutions may make the SIS problem qualitatively harder than just restricting the 2 norm. There is already significant empirical evidence for this belief: the most practically efficient attacks on SIS, which use lattice basis reduction (e.g., [12,9]), only find solutions with bounded 2 norm, whereas combinatorial attacks such as [5,27] (see also [22]) or theoretical lattice attacks [10] that can guarantee an ∞ bound are much more costly in practice, and also require exponential space. Finally, we mention that setting β ∞ β is very natural in the usual formulations of one-way and collision-resistant hash functions based on SIS, where collisions correspond (for example) to vectors in {−1, 0, 1} m , and therefore have ∞ bound β ∞ = 1, but 2 bound β = √ m. Similar gaps between β ∞ and β can easily be enforced in other applications, e.g., digital signatures [13].…”