2018
DOI: 10.1007/978-3-319-98113-0_19
|View full text |Cite
|
Sign up to set email alerts
|

Estimate All the {LWE, NTRU} Schemes!

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
63
0
1

Year Published

2018
2018
2019
2019

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 112 publications
(76 citation statements)
references
References 37 publications
1
63
0
1
Order By: Relevance
“…Concretely, in the quantum setting, the lower bounds of enumeration and sieving cross in dimensions roughly 300-400 in the HKZ-basis model or beyond 500 in the Rankin-basis model, depending on how many enumerations are allowed. We note that in high dimension, our lower bound for enumeration with 10 10 HKZ bases is somewhat close to the numerical extrapolation of [17, (2)], called Core-Enum+O(1) in [2]. Upper/lower bounds on the classical/quantum cost of enumeration with cylinder pruning, using strongly-reduced basis models.…”
Section: Introductionsupporting
confidence: 72%
See 3 more Smart Citations
“…Concretely, in the quantum setting, the lower bounds of enumeration and sieving cross in dimensions roughly 300-400 in the HKZ-basis model or beyond 500 in the Rankin-basis model, depending on how many enumerations are allowed. We note that in high dimension, our lower bound for enumeration with 10 10 HKZ bases is somewhat close to the numerical extrapolation of [17, (2)], called Core-Enum+O(1) in [2]. Upper/lower bounds on the classical/quantum cost of enumeration with cylinder pruning, using strongly-reduced basis models.…”
Section: Introductionsupporting
confidence: 72%
“…The security level is the base-2 logarithm of the cost, which is divided by two in the quantum computing model [6,24]. We also draw the curve of 2 0.292n and 2 0.265n which are simplified lower bounds of the cost for solving SVP-n used in [2] for classical and quantum computers, respectively.…”
Section: Security Estimates For Enumerationmentioning
confidence: 99%
See 2 more Smart Citations
“…[36,22,33,18,20,26,10]), which makes security estimates tricky. Lattice-based NIST submissions use varying cost models, which gives rise to a wide range of security estimates [5]. The biggest source of divergence is the cost assessment of a subroutine to find nearly shortest lattice vectors in certain dimensions (typically the blocksize of reduction algorithms), which is chosen among two families: sieving [3,36,33,26,14] and enumeration.…”
Section: Introductionmentioning
confidence: 99%