2020
DOI: 10.1007/978-3-030-56880-1_7
|View full text |Cite
|
Sign up to set email alerts
|

Faster Enumeration-Based Lattice Reduction: Root Hermite Factor $$k^{1/(2k)}$$ Time $$k^{k/8+o(k)}$$

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(11 citation statements)
references
References 28 publications
0
11
0
Order By: Relevance
“…The former includes the family of so-called enumeration algorithms [93,94] that run in time 2 Θ(n lg n) . Recent result of Albrecht et al [95] shows the runtime exponent of 1 8 n lg n þ oðn lg nÞ beating the longstanding exponent 1 2e n lg n þ oðn lg nÞ from Ref. [86].…”
Section: Algorithms For Svpmentioning
confidence: 96%
See 1 more Smart Citation
“…The former includes the family of so-called enumeration algorithms [93,94] that run in time 2 Θ(n lg n) . Recent result of Albrecht et al [95] shows the runtime exponent of 1 8 n lg n þ oðn lg nÞ beating the longstanding exponent 1 2e n lg n þ oðn lg nÞ from Ref. [86].…”
Section: Algorithms For Svpmentioning
confidence: 96%
“…. Using a more involved preprocessing and tricks [95], one can further improve the runtime exponent to the currently best known In order to set up the radius R, one can, for instance, use Minkowski's upper bound on λ 1 . Such enumeration is rather costly, and one can hope that the projection of the shortest vector might be shorter than λ 1 .…”
Section: Classical Enumerationmentioning
confidence: 99%
“…There are two types of lattice reduction algorithms that may be used to implement the SVP "oracle," enumeration and sieving. Enumeration algorithms (see, for example, [296][297][298][299][300]) require small amounts of memory but have run times that are super-exponential in β . Sieving algorithms (see, for example [301][302][303]) have run times that are exponential in β , but also require an exponential amount of memory.…”
Section: On the Concrete Intractability Of Finding Short Lattice Vectorsmentioning
confidence: 99%
“…Another part of the original paper [70, Section 6.3], and almost all follow-ups [24,25,22,15,21,23], consider however security against adversaries able to do 2 λ operations. However, the condition was copied without change, which possibly explains why a large α was chosen in several implementations 5 .…”
Section: Typementioning
confidence: 99%
“…Since lattice-based cryptography is becoming a strong contender for post-quantum cryptography and offers many interesting functionalities to cryptography, such as efficient Fully Homomorphic Encryption (fhe), new algorithms and implementations of lattice reduction have been designed to give better security estimate for latticebased cryptography. Some improvements mainly target the bkz algorithm since it allows to finely adjust the approximation factor [29,30,35,14,53,5]. Others are heuristic and improve sieving technique for solving svp, use a reduction technique in the lattice dimension [6], exploit subfield structure and symmetries in structured lattices [60,41], or use the tensor core architecture of GPU [26].…”
Section: Introductionmentioning
confidence: 99%