Frodo: Take off the ring! practical, quantum-secure key exchange from LWE

J Bos, C Costello, L Ducas, I Mironov… - Proceedings of the …, 2016 - dl.acm.org
Lattice-based cryptography offers some of the most attractive primitives believed to be
resistant to quantum computers. Following increasing interest from both companies and …

Post-quantum key exchange for the internet and the open quantum safe project

D Stebila, M Mosca - International Conference on Selected Areas in …, 2016 - Springer
Designing public key cryptosystems that resist attacks by quantum computers is an important
area of current cryptographic research and standardization. To retain confidentiality of …

Shortest vector from lattice sieving: a few dimensions for free

L Ducas - Annual International Conference on the Theory and …, 2018 - Springer
Asymptotically, the best known algorithms for solving the Shortest Vector Problem (SVP) in a
lattice of dimension n are sieve algorithms, which have heuristic complexity estimates …

Sieving for shortest vectors in lattices using angular locality-sensitive hashing

T Laarhoven - Advances in Cryptology--CRYPTO 2015: 35th Annual …, 2015 - Springer
By replacing the brute-force list search in sieving algorithms with Charikar's angular locality-
sensitive hashing (LSH) method, we get both theoretical and practical speedups for solving …

[PDF][PDF] Search problems in cryptography: from fingerprinting to lattice sieving

T Laarhoven - 2016 - research.tue.nl
Search problems in cryptography Page 1 Search problems in cryptography: from fingerprinting
to lattice sieving Citation for published version (APA): Laarhoven, T. (2016). Search problems …

An efficient lattice-based signature scheme with provably secure instantiation

S Akleylek, N Bindel, J Buchmann, J Krämer… - Progress in Cryptology …, 2016 - Springer
In view of the expected progress in cryptanalysis it is important to find alternatives for
currently used signature schemes such as RSA and ECDSA. The most promising lattice …

Progressive lattice sieving

T Laarhoven, A Mariano - International Conference on Post-Quantum …, 2018 - Springer
Most algorithms for hard lattice problems are based on the principle of rank reduction: to
solve a problem in ad-dimensional lattice, one first solves one or more problem instances in …

Heap: A fully homomorphic encryption accelerator with parallelized bootstrapping

R Agrawal, A Chandrakasan… - 2024 ACM/IEEE 51st …, 2024 - ieeexplore.ieee.org
Fully homomorphic encryption (FHE) is a cryptographic technology with the potential to
revolutionize data privacy by enabling computation on encrypted data. Lately, the CKKS …

Lattice-based encryption over standard lattices in hardware

J Howe, C Moore, M O'Neill, F Regazzoni… - Proceedings of the 53rd …, 2016 - dl.acm.org
Lattice-based cryptography has gained credence recently as a replacement for current
public-key cryptosystems, due to its quantum-resilience, versatility, and relatively low key …

Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing

T Laarhoven, B de Weger - … on Cryptology and Information Security in …, 2015 - Springer
Recently, it was shown that angular locality-sensitive hashing (LSH) can be used to
significantly speed up lattice sieving, leading to a heuristic time complexity for solving the …