Security estimation of LWE via BKW algorithms
Abstract The Learning With Errors (LWE) problem is widely used in lattice-based cryptography, which is the most promising post-quantum cryptography direction. There are a variety of LWE-solving methods, which can be classified into four groups: lattice methods, algebraic methods, combinatorial metho...
| Published in: | Cybersecurity |
|---|---|
| Main Authors: | Yu Wei, Lei Bi, Xianhui Lu, Kunpeng Wang |
| Format: | Article |
| Language: | English |
| Published: |
SpringerOpen
2023-09-01
|
| Subjects: | |
| Online Access: | https://doi.org/10.1186/s42400-023-00158-9 |
Similar Items
Improvements on Making BKW Practical for Solving LWE
by: Alessandro Budroni, et al.
Published: (2021-10-01)
by: Alessandro Budroni, et al.
Published: (2021-10-01)
An improved BKW algorithm on the learning with rounding problem
by: Yu Wei, et al.
Published: (2025-06-01)
by: Yu Wei, et al.
Published: (2025-06-01)
Quantum security analysis of Module-LWE PQC based on practical cost estimates
by: Seong-Min Cho, et al.
Published: (2025-09-01)
by: Seong-Min Cho, et al.
Published: (2025-09-01)
<i>R</i>-LWE-Based Distributed Key Generation and Threshold Decryption
by: Ferran Alborch, et al.
Published: (2022-02-01)
by: Ferran Alborch, et al.
Published: (2022-02-01)
Hybrid dual attack on LWE with arbitrary secrets
by: Lei Bi, et al.
Published: (2022-08-01)
by: Lei Bi, et al.
Published: (2022-08-01)
Optimization of Lattice-Based Cryptographic Key Generation using Genetic Algorithms for Post-Quantum Security
by: Tara Nawzad Ahmad Al Attar, et al.
Published: (2025-04-01)
by: Tara Nawzad Ahmad Al Attar, et al.
Published: (2025-04-01)
Securing IoT communication: a module-LWE key exchange protocol with efficient error reconciliation technique
by: Alvary Kefas Kwala, et al.
Published: (2025-07-01)
by: Alvary Kefas Kwala, et al.
Published: (2025-07-01)
A Review of Sieve Algorithms in Solving the Shortest Lattice Vector Problem
by: Zedong Sun, et al.
Published: (2020-01-01)
by: Zedong Sun, et al.
Published: (2020-01-01)
Estimation of the hardness of the learning with errors problem with a restricted number of samples
by: Bindel Nina, et al.
Published: (2019-03-01)
by: Bindel Nina, et al.
Published: (2019-03-01)
x2DL: A high throughput architecture for binary‐ring‐learning‐with‐error‐based post quantum cryptography schemes
by: Shaik Ahmadunnisa, et al.
Published: (2024-12-01)
by: Shaik Ahmadunnisa, et al.
Published: (2024-12-01)
A Mathematical Perspective on Post-Quantum Cryptography
by: Maximilian Richter, et al.
Published: (2022-07-01)
by: Maximilian Richter, et al.
Published: (2022-07-01)
Learning with Errors: A Lattice-Based Keystone of Post-Quantum Cryptography
by: Maria E. Sabani, et al.
Published: (2024-04-01)
by: Maria E. Sabani, et al.
Published: (2024-04-01)
On Advances of Lattice-Based Cryptographic Schemes and Their Implementations
by: Harshana Bandara, et al.
Published: (2022-11-01)
by: Harshana Bandara, et al.
Published: (2022-11-01)
Improving BDD Enumeration for LWE Problem Using GPU
by: Mohamed S. Esseissah, et al.
Published: (2020-01-01)
by: Mohamed S. Esseissah, et al.
Published: (2020-01-01)
Security in Post-Quantum Era: A Comprehensive Survey on Lattice-Based Algorithms
by: Hien Nguyen, et al.
Published: (2025-01-01)
by: Hien Nguyen, et al.
Published: (2025-01-01)
Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism
by: Kübra Seyhan, et al.
Published: (2023-05-01)
by: Kübra Seyhan, et al.
Published: (2023-05-01)
A survey on lattice-based digital signature
by: Fengxia Liu, et al.
Published: (2024-04-01)
by: Fengxia Liu, et al.
Published: (2024-04-01)
Flexible and Compact MLWE-Based KEM
by: Wenqi Liang, et al.
Published: (2024-06-01)
by: Wenqi Liang, et al.
Published: (2024-06-01)
THE STATE OF STANDARDIZATION OF POST-QUANTUM CRYPTO-ALGORITHMS AT THE GLOBAL LEVEL
by: Oleksandra Tsentseria, et al.
Published: (2023-06-01)
by: Oleksandra Tsentseria, et al.
Published: (2023-06-01)
Security and Performance Analyses of Post-Quantum Digital Signature Algorithms and Their TLS and PKI Integrations
by: Manohar Raavi, et al.
Published: (2025-06-01)
by: Manohar Raavi, et al.
Published: (2025-06-01)
An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme
by: Sagarika Ghosh, et al.
Published: (2021-02-01)
by: Sagarika Ghosh, et al.
Published: (2021-02-01)
Efficient post-quantum secure deterministic wallet scheme
by: Mingxing Hu, et al.
Published: (2024-08-01)
by: Mingxing Hu, et al.
Published: (2024-08-01)
Quantum vs post‐quantum security for future networks: Survey
by: Savo Glisic
Published: (2024-01-01)
by: Savo Glisic
Published: (2024-01-01)
A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies
by: Khondokar Fida Hasan, et al.
Published: (2024-01-01)
by: Khondokar Fida Hasan, et al.
Published: (2024-01-01)
Template Attack of LWE/LWR-Based Schemes with Cyclic Message Rotation
by: Yajing Chang, et al.
Published: (2022-10-01)
by: Yajing Chang, et al.
Published: (2022-10-01)
Post-quantum cryptography-driven security framework for cloud computing
by: Ukwuoma Henry Chima, et al.
Published: (2022-03-01)
by: Ukwuoma Henry Chima, et al.
Published: (2022-03-01)
A bimodal lattice-based linearly homomorphic signature for chain-based implicit data storage scheme
by: Ruifeng Li, et al.
Published: (2025-09-01)
by: Ruifeng Li, et al.
Published: (2025-09-01)
LACT+: Practical Post-Quantum Scalable Confidential Transactions
by: Jayamine Alupotha, et al.
Published: (2023-05-01)
by: Jayamine Alupotha, et al.
Published: (2023-05-01)
Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography
by: Aikata Aikata, et al.
Published: (2023-06-01)
by: Aikata Aikata, et al.
Published: (2023-06-01)
A Concrete LIP-Based KEM With Simple Lattices
by: Gustavo de Castro Biage, et al.
Published: (2024-01-01)
by: Gustavo de Castro Biage, et al.
Published: (2024-01-01)
A Lightweight Post-Quantum Lattice-Based RSA for Secure Communications
by: Iqra Mustafa, et al.
Published: (2020-01-01)
by: Iqra Mustafa, et al.
Published: (2020-01-01)
Lattice-Based Three Party Authenticated Key Agreement Scheme in Medical IoT for Post-Quantum Environment
by: Arman Ahmad, et al.
Published: (2024-01-01)
by: Arman Ahmad, et al.
Published: (2024-01-01)
Composable security in relativistic quantum cryptography
by: V Vilasini, et al.
Published: (2019-01-01)
by: V Vilasini, et al.
Published: (2019-01-01)
Randomized Oblivious Transfer for Secure Multiparty Computation in the Quantum Setting
by: Bruno Costa, et al.
Published: (2021-07-01)
by: Bruno Costa, et al.
Published: (2021-07-01)
A Hybrid Key Generator Model Based on Multiscale Prime Sieve and Quantum-Inspired Approaches
by: Gerardo Iovane, et al.
Published: (2025-07-01)
by: Gerardo Iovane, et al.
Published: (2025-07-01)
Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism
by: Suparna Kundu, et al.
Published: (2025-03-01)
by: Suparna Kundu, et al.
Published: (2025-03-01)
Comparative analysis of lattice-based cryptographic schemes for secure IoT communications
by: Alvary Kefas Kwala, et al.
Published: (2024-09-01)
by: Alvary Kefas Kwala, et al.
Published: (2024-09-01)
Password authenticated key exchange-based on Kyber for mobile devices
by: Kübra Seyhan, et al.
Published: (2024-03-01)
by: Kübra Seyhan, et al.
Published: (2024-03-01)
Factoring the Modulus of Type <i>N</i> = <i>p</i><sup>2</sup><i>q</i> by Finding Small Solutions of the Equation <i>e</i><i>r</i> − (<i>N</i><i>s</i> + <i>t</i>) = <i>α</i><i>p</i><sup>2</sup> + <i>β</i><i>q</i><sup>2</sup>
by: Muhammad Asyraf Asbullah, et al.
Published: (2021-11-01)
by: Muhammad Asyraf Asbullah, et al.
Published: (2021-11-01)
ATHOS: A Hybrid Accelerator for PQC CRYSTALS-Algorithms Exploiting New CV-X-IF Interface
by: Alessandra Dolmeta, et al.
Published: (2024-01-01)
by: Alessandra Dolmeta, et al.
Published: (2024-01-01)
Similar Items
-
Improvements on Making BKW Practical for Solving LWE
by: Alessandro Budroni, et al.
Published: (2021-10-01) -
An improved BKW algorithm on the learning with rounding problem
by: Yu Wei, et al.
Published: (2025-06-01) -
Quantum security analysis of Module-LWE PQC based on practical cost estimates
by: Seong-Min Cho, et al.
Published: (2025-09-01) -
<i>R</i>-LWE-Based Distributed Key Generation and Threshold Decryption
by: Ferran Alborch, et al.
Published: (2022-02-01) -
Hybrid dual attack on LWE with arbitrary secrets
by: Lei Bi, et al.
Published: (2022-08-01)
