A decade of lattice cryptography

C Peikert - Foundations and trends® in theoretical computer …, 2016 - nowpublishers.com
Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …

On the concrete hardness of learning with errors

MR Albrecht, R Player, S Scott - Journal of Mathematical Cryptology, 2015 - degruyter.com
The learning with errors (LWE) problem has become a central building block of modern
cryptographic constructions. This work collects and presents hardness results for concrete …

Survey on fully homomorphic encryption, theory, and applications

C Marcolla, V Sucasas, M Manzano… - Proceedings of the …, 2022 - ieeexplore.ieee.org
Data privacy concerns are increasing significantly in the context of the Internet of Things,
cloud services, edge computing, artificial intelligence applications, and other applications …

TFHE: fast fully homomorphic encryption over the torus

I Chillotti, N Gama, M Georgieva, M Izabachène - Journal of Cryptology, 2020 - Springer
This work describes a fast fully homomorphic encryption scheme over the torus (TFHE) that
revisits, generalizes and improves the fully homomorphic encryption (FHE) based on GSW …

CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM

J Bos, L Ducas, E Kiltz, T Lepoint… - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
Rapid advances in quantum computing, together with the announcement by the National
Institute of Standards and Technology (NIST) to define new standards for digitalsignature …

Faster fully homomorphic encryption: Bootstrapping in less than 0.1 seconds

I Chillotti, N Gama, M Georgieva… - Advances in Cryptology …, 2016 - Springer
In this paper, we revisit fully homomorphic encryption (FHE) based on GSW and its ring
variants. We notice that the internal product of GSW can be replaced by a simpler external …

Post-quantum key {Exchange—A} new hope

E Alkim, L Ducas, T Pöppelmann… - 25th USENIX Security …, 2016 - usenix.org
At IEEE Security & Privacy 2015, Bos, Costello, Naehrig, and Stebila proposed an
instantiation of Peikert's ring-learning-with-errors–based (Ring-LWE) key exchange protocol …

Programmable bootstrapping enables efficient homomorphic inference of deep neural networks

I Chillotti, M Joye, P Paillier - … Symposium, CSCML 2021, Be'er Sheva …, 2021 - Springer
In many cases, machine learning and privacy are perceived to be at odds. Privacy concerns
are especially relevant when the involved data are sensitive. This paper deals with the …

[PDF][PDF] CRYSTALS-Kyber algorithm specifications and supporting documentation

R Avanzi, J Bos, L Ducas, E Kiltz, T Lepoint… - NIST PQC …, 2019 - pq-crystals.org
• Increase noise parameter for Kyber512 In the round-2 submission of Kyber, the decryption
error for Kyber512 was rather conservative, while at the same time, there were requests to …

Sapphire: A configurable crypto-processor for post-quantum lattice-based protocols

U Banerjee, TS Ukyab, AP Chandrakasan - arXiv preprint arXiv …, 2019 - arxiv.org
Public key cryptography protocols, such as RSA and elliptic curve cryptography, will be
rendered insecure by Shor's algorithm when large-scale quantum computers are built …