Survey on fully homomorphic encryption, theory, and applications

C Marcolla, V Sucasas, M Manzano… - Proceedings of the …, 2022 - ieeexplore.ieee.org
Data privacy concerns are increasing significantly in the context of the Internet of Things,
cloud services, edge computing, artificial intelligence applications, and other applications …

Salsa: Attacking lattice cryptography with transformers

E Wenger, M Chen, F Charton… - Advances in Neural …, 2022 - proceedings.neurips.cc
Currently deployed public-key cryptosystems will be vulnerable to attacks by full-scale
quantum computers. Consequently," quantum resistant" cryptosystems are in high demand …

SALSA VERDE: a machine learning attack on LWE with sparse small secrets

C Li, E Wenger, Z Allen-Zhu… - Advances in Neural …, 2023 - proceedings.neurips.cc
Learning with Errors (LWE) is a hard math problem used in post-quantum cryptography.
Homomorphic Encryption (HE) schemes rely on the hardness of the LWE problem for their …

SalsaPicante: A machine learning attack on LWE with binary secrets

CY Li, J Sotáková, E Wenger, M Malhou… - Proceedings of the …, 2023 - dl.acm.org
Learning with Errors (LWE) is a hard math problem underpinning many proposed post-
quantum cryptographic (PQC) systems. The only PQC Key Exchange Mechanism (KEM) …

On the success probability of solving unique SVP via BKZ

EW Postlethwaite, F Virdia - IACR International Conference on Public-Key …, 2021 - Springer
As lattice-based key encapsulation, digital signature, and fully homomorphic encryption
schemes near standardisation, ever more focus is being directed to the precise estimation of …

Salsa fresca: Angular embeddings and pre-training for ml attacks on learning with errors

S Stevens, E Wenger, C Li, N Nolte, E Saxena… - arXiv preprint arXiv …, 2024 - arxiv.org
Learning with Errors (LWE) is a hard math problem underlying recently standardized post-
quantum cryptography (PQC) systems for key exchange and digital signatures. Prior work …

Cryptanalysis of PLWE based on zero-trace quadratic roots

B Barbero-Lucas, I Blanco-Chacón… - arXiv preprint arXiv …, 2023 - arxiv.org
We extend two of the attacks on the PLWE problem presented in (Y. Elias, KE Lauter, E.
Ozman, and KE Stange, Ring-LWE Cryptography for the Number Theorist, in Directions in …

Application of Discrete Pruned Enumeration in Solving BDD

L Luan, Y Shi, C Gu, Y Zheng - Symmetry, 2023 - mdpi.com
The bounded distance decoding (BDD) is a fundamental problem in lattice-based
cryptography which is derived from the closest vector problem (CVP). In this paper, we adapt …

[PDF][PDF] The Need for Post-Quantum Cryptography

T Harper, R Albert - 2022 - authortomharper.com
Encryption is necessary to ensure the security of online communications. Many different
methods of encryption are available. The Rivest–Shamir–Adleman (RSA) cryptosystem is a …

Theoretical hardness of algebraically structured learning with errors

K Boudgoust - 2021 - theses.hal.science
The main focus of this Ph. D thesis lies on the computational problem Learning With Errors
(LWE). It is a core building block of lattice-based cryptography, which itself is among the …