22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

[5] A. Blum, A. Kalai, and H. Wasserman. Noise-tolerant learning, the parity problem, and the statistical<br />

query model. J. ACM, 50(4):506–519, 2003.<br />

[6] D. Boneh and D. M. Freeman. Linearly homomorphic signatures over binary fields and new tools for<br />

lattice-based signatures. In Public Key Cryptography, pages 1–16, 2011.<br />

[7] J.-Y. Cai and A. Nerurkar. An improved worst-case to average-case connection for lattice problems. In<br />

FOCS, pages 468–477, 1997.<br />

[8] Y. Chen and P. Q. Nguyen. BKZ 2.0: Better lattice security estimates. In ASIACRYPT, pages 1–20,<br />

2011.<br />

[9] D. Dadush, C. Peikert, and S. Vempala. Enumerative lattice algorithms in any norm via M-ellipsoid<br />

coverings. In FOCS, pages 580–589, 2011.<br />

[10] N. Döttling and J. Müller-Quade. Lossy codes and a new variant of the learning-with-errors problem.<br />

Manuscript. To appear in Eurocrypt 2013, 2013.<br />

[11] N. Gama and P. Q. Nguyen. Predicting lattice reduction. In EUROCRYPT, pages 31–51, 2008.<br />

[12] C. Gentry, C. Peikert, and V. Vaikuntanathan. Trapdoors for hard lattices and new cryptographic<br />

constructions. In STOC, pages 197–206, 2008.<br />

[13] A. K. Lenstra, H. W. Lenstra, Jr., and L. Lovász. Factoring polynomials with rational coefficients.<br />

Mathematische Annalen, 261(4):515–534, December 1982.<br />

[14] D. Micciancio. Almost perfect lattices, the covering radius problem, and applications to Ajtai’s<br />

connection factor. SIAM J. Comput., 34(1):118–169, 2004.<br />

[15] D. Micciancio. Duality in lattice cryptography. In Public Key Cryptography, 2010. Invited talk.<br />

[16] D. Micciancio and S. Goldwasser. Complexity of Lattice Problems: a cryptographic perspective, volume<br />

671 of The Kluwer International Series in Engineering and Computer Science. Kluwer Academic<br />

Publishers, Boston, Massachusetts, 2002.<br />

[17] D. Micciancio and P. Mol. Pseudorandom knapsacks and the sample complexity of LWE search-todecision<br />

reductions. In CRYPTO, pages 465–484, 2011.<br />

[18] D. Micciancio and C. Peikert. Trapdoors for lattices: Simpler, tighter, faster, smaller. In EUROCRYPT,<br />

pages 700–718, 2012.<br />

[19] D. Micciancio and O. Regev. Worst-case to average-case reductions based on Gaussian measures. SIAM<br />

J. Comput., 37(1):267–302, 2007. Preliminary version in FOCS 2004.<br />

[20] D. Micciancio and O. Regev. Lattice-based cryptography. In Post Quantum Cryptography, pages<br />

147–191. Springer, February 2009.<br />

[21] C. Peikert. Public-key cryptosystems from the worst-case shortest vector problem. In STOC, pages<br />

333–342, 2009.<br />

[22] C. Peikert. An efficient and parallel Gaussian sampler for lattices. In CRYPTO, pages 80–97, 2010.<br />

23<br />

10. Hardness of SIS and LWE with Small Parameters

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!