2020
DOI: 10.1007/978-3-030-56880-1_11
|View full text |Cite
|
Sign up to set email alerts
|

Rounding in the Rings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 34 publications
0
5
0
Order By: Relevance
“…While the result from [38] enjoys small entropy demands on values t i and small value k, it can not handle the information leakage. On the other hand, the result from [25] is theoretically sufficient and can handle the leakage, however, it suffers from large parameters, specially the size of k (length of vector a) is of order of the security parameter. There are still similar versions of Ring-LHL (such as [29]) but due to the need for clear and efficient choice of parameters, we propose a special version of Ring-LHL which manages to handle the information leaking from the public-key and still enjoys small parameters.…”
Section: Challenges and Contributionsmentioning
confidence: 99%
“…While the result from [38] enjoys small entropy demands on values t i and small value k, it can not handle the information leakage. On the other hand, the result from [25] is theoretically sufficient and can handle the leakage, however, it suffers from large parameters, specially the size of k (length of vector a) is of order of the security parameter. There are still similar versions of Ring-LHL (such as [29]) but due to the need for clear and efficient choice of parameters, we propose a special version of Ring-LHL which manages to handle the information leaking from the public-key and still enjoys small parameters.…”
Section: Challenges and Contributionsmentioning
confidence: 99%
“…While MLWR does not have as extensive a network of security reductions as MLWE, there have been some results such as [238]. Moreover, all experimental investigations to date have indicated that MLWR (at least the MLWR instances relevant to cryptosystems like Saber) does not differ from MLWE in terms of the cryptanalytic techniques that are applicable or in terms of how successful those techniques are.…”
Section: Sabermentioning
confidence: 99%
“…While MLWR does not have as extensive a network of security reductions as MLWE, there have been some results such as [236]. Moreover, all experimental investigations to date have indicated that MLWR (at least the MLWR instances relevant to cryptosystems like Saber) does not differ from MLWE in terms of the cryptanalytic techniques that are applicable or in terms of how successful those techniques are.…”
Section: Sabermentioning
confidence: 99%