Finding shortest lattice vectors faster using quantum search

T Laarhoven, M Mosca, J Van De Pol - Designs, Codes and Cryptography, 2015 - Springer
By applying a quantum search algorithm to various heuristic and provable sieve algorithms
from the literature, we obtain improved asymptotic quantum results for solving the shortest …

[PDF][PDF] Search problems in cryptography: from fingerprinting to lattice sieving

T Laarhoven - 2016 - research.tue.nl
Search problems in cryptography Page 1 Search problems in cryptography: from fingerprinting
to lattice sieving Citation for published version (APA): Laarhoven, T. (2016). Search problems …

High-throughput ring-LWE cryptoprocessors

CP Rentería-Mejía… - IEEE Transactions on Very …, 2017 - ieeexplore.ieee.org
This paper presents the design of ring learning with errors (LWE) cryptoprocessors using
number theoretic transform (NTT) cores and Gaussian samplers based on the inverse …

Finding closest lattice vectors using approximate Voronoi cells

E Doulgerakis, T Laarhoven, B de Weger - Post-Quantum Cryptography …, 2019 - Springer
The two traditional hard problems underlying the security of lattice-based cryptography are
the shortest vector problem (SVP) and the closest vector problem (CVP). For a long time …

Solving hard lattice problems and the security of lattice-based cryptosystems

TMM Laarhoven, J van de Pol, BMM de Weger - 2012 - research.tue.nl
This paper is a tutorial introduction to the present state-of-the-art in the field of security of
lattice-based cryptosystems. After a short introduction to lattices, we describe the main hard …

Solving the shortest vector problem in lattices faster using quantum search

T Laarhoven, M Mosca, J Van De Pol - … 2013, Limoges, France, June 4-7 …, 2013 - Springer
By applying Grover's quantum search algorithm to the lattice algorithms of Micciancio and
Voulgaris, Nguyen and Vidick, Wang et al., and Pujol and Stehlé, we obtain improved …

A practical view of the state-of-the-art of lattice-based cryptanalysis

A Mariano, T Laarhoven, F Correia, M Rodrigues… - Ieee …, 2017 - ieeexplore.ieee.org
This paper describes the lattice problems that are key in the study of lattice-based
cryptography, identifies and categorizes methods for solving these problems, analyzes …

Lattice-based cryptoprocessor for CCA-secure identity-based encryption

CP Rentería-Mejía… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we propose a lattice-based encryption scheme for Identity-Based Encryption
(IBE) which is secure against Chosen-Ciphertext Attacks (CCA), and it is deduced from a …

[PDF][PDF] Better Sampling Method of Enumeration Solution for BKZ-Simulation.

GR Moghissi, A Payandeh - ISeCure, 2021 - sid.ir
The exact manner of BKZ algorithm for higher block sizes cannot be studied by practical
running, so simulation of BKZ can be used to predict the total cost and output quality of BKZ …

Rejecting Claimed Speedup of 2^ 𝛽/2 in Extreme Pruning and Revising BKZ 2.0 for Better Speedup

GR Moghissi, A Payandeh - Journal of Computing and Security, 2021 - jcomsec.ui.ac.ir
BKZ 2.0 algorithm is one of the claimant lattice reduction algorithms which incorporates
extreme pruning as its main phase. The non-extreme pruning and extreme pruning in the …