Survey on fully homomorphic encryption, theory, and applications

C Marcolla, V Sucasas, M Manzano… - Proceedings of the …, 2022 - ieeexplore.ieee.org
Data privacy concerns are increasing significantly in the context of the Internet of Things,
cloud services, edge computing, artificial intelligence applications, and other applications …

The general sieve kernel and new records in lattice reduction

MR Albrecht, L Ducas, G Herold, E Kirshanova… - … Conference on the …, 2019 - Springer
Abstract We propose the General Sieve Kernel (G6K, pronounced/e. si. ka/), an abstract
stateful machine supporting a wide variety of lattice reduction strategies based on sieving …

LWE with side information: attacks and concrete security estimation

D Dachman-Soled, L Ducas, H Gong… - Annual International …, 2020 - Springer
We propose a framework for cryptanalysis of lattice-based schemes, when side information—
in the form of “hints”—about the secret and/or error is available. Our framework generalizes …

Hawk: Module LIP Makes Lattice Signatures Fast, Compact and Simple

L Ducas, EW Postlethwaite, LN Pulles… - … Conference on the …, 2022 - Springer
We propose the signature scheme Hawk, a concrete instantiation of proposals to use the
Lattice Isomorphism Problem (LIP) as a foundation for cryptography that focuses on …

NTRU fatigue: how stretched is overstretched?

L Ducas, W van Woerden - … 2021: 27th International Conference on the …, 2021 - Springer
Until recently lattice reduction attacks on NTRU lattices were thought to behave similar as on
(ring-) LWE lattices with the same parameters. However several works (Albrecht-Bai-Ducas …

Lattice‐based cryptosystems in standardisation processes: A survey

A Wang, D Xiao, Y Yu - IET Information Security, 2023 - Wiley Online Library
The current widely used public‐key cryptosystems are vulnerable to quantum attacks. To
prepare for cybersecurity in the quantum era, some projects have been launched to call for …

Lattice attacks on NTRU and LWE: a history of refinements

M Albrecht, L Ducas - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Since its invention in 1982, the LLL lattice reduction algorithm (Lenstra, Lenstra, Lovasz
1982) has found countless applications. In cryptanalysis, the two most prominent …

Faster dual lattice attacks for solving LWE with applications to CRYSTALS

Q Guo, T Johansson - Advances in Cryptology–ASIACRYPT 2021: 27th …, 2021 - Springer
Cryptosystems based on the learning with errors (LWE) problem are assigned a security
level that relates to the cost of generic algorithms for solving the LWE problem. This includes …

ModFalcon: Compact signatures based on module-NTRU lattices

C Chuengsatiansup, T Prest, D Stehlé… - Proceedings of the 15th …, 2020 - dl.acm.org
Lattices lead to promising practical post-quantum digital signatures, combining asymptotic
efficiency with strong theoretical security guarantees. However, tuning their parameters into …

A complete analysis of the BKZ lattice reduction algorithm

J Li, PQ Nguyen - Journal of Cryptology, 2025 - Springer
We present the first rigorous dynamic analysis of BKZ, the most widely used lattice reduction
algorithm besides LLL: we provide guarantees on the quality of the current lattice basis …