Advances in cryptology -- EUROCRYPT 2020 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings.: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings. Part III (2020)
- Record Type:
- Book
- Title:
- Advances in cryptology -- EUROCRYPT 2020 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings.: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings. Part III (2020)
- Main Title:
- Advances in cryptology -- EUROCRYPT 2020 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings.
- Other Titles:
- EUROCRYPT 2020
- Further Information:
- Note: Anne Canteaut, Yuval Ishai (eds.).
- Other Names:
- Canteaut, Anne
Ishai, Yuval
EUROCRYPT (Conference), 39th - Contents:
- Intro -- Preface -- Eurocrypt 2020 -- Contents -- Part III -- Asymmetric Cryptanalysis -- (One) Failure Is Not an Option: Bootstrapping the Search for Failures in Lattice-Based Encryption Schemes -- 1 Introduction -- 2 Preliminaries -- 3 Lattice-Based Encryption -- 3.1 Passively and Actively Secure Encryption -- 3.2 Decryption Failures -- 4 Failure Boosting Attack Technique -- 5 Directional Failure Boosting -- 5.1 Distributions -- 5.2 Step 1: Estimating the Direction E -- 5.3 Step 2: Finding Weak Ciphertexts -- 5.4 Finalizing the Attack with Lattice Reduction 6 Efficiency of Directional Failure Boosting -- 6.1 Accuracy of the Estimate -- 6.2 Estimating i, ft and i, ft -- 6.3 Total Amount of Work and Queries -- 7 Discussion and Variants -- 7.1 Comparison with D'Anvers et al. ch1Danvers20182 -- 7.2 Minimizing the Number of Queries Instead -- 7.3 Application to ss-ntru-pke and Improvement of Guo et al. ch1Guo2019 -- References -- Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices -- 1 Introduction -- 2 Preliminaries -- 2.1 Gram-Schmidt Orthogonalization -- 2.2 Parametric Statistics 2.3 Discrete Gaussian Distributions -- 2.4 Power-of-Two Cyclotomic Fields -- 2.5 NTRU Lattices -- 3 Hash-and-Sign over NTRU Lattices -- 3.1 The KGPV Sampler and Its Variant -- 4 Side-Channel Attack Against Trapdoor Samplers: A Roadmap -- 5 Recovering Totally Positive Elements -- 5.1 Case of the Power Basis -- 5.2 Case of the Bit-Reversed Order Basis -- 6Intro -- Preface -- Eurocrypt 2020 -- Contents -- Part III -- Asymmetric Cryptanalysis -- (One) Failure Is Not an Option: Bootstrapping the Search for Failures in Lattice-Based Encryption Schemes -- 1 Introduction -- 2 Preliminaries -- 3 Lattice-Based Encryption -- 3.1 Passively and Actively Secure Encryption -- 3.2 Decryption Failures -- 4 Failure Boosting Attack Technique -- 5 Directional Failure Boosting -- 5.1 Distributions -- 5.2 Step 1: Estimating the Direction E -- 5.3 Step 2: Finding Weak Ciphertexts -- 5.4 Finalizing the Attack with Lattice Reduction 6 Efficiency of Directional Failure Boosting -- 6.1 Accuracy of the Estimate -- 6.2 Estimating i, ft and i, ft -- 6.3 Total Amount of Work and Queries -- 7 Discussion and Variants -- 7.1 Comparison with D'Anvers et al. ch1Danvers20182 -- 7.2 Minimizing the Number of Queries Instead -- 7.3 Application to ss-ntru-pke and Improvement of Guo et al. ch1Guo2019 -- References -- Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices -- 1 Introduction -- 2 Preliminaries -- 2.1 Gram-Schmidt Orthogonalization -- 2.2 Parametric Statistics 2.3 Discrete Gaussian Distributions -- 2.4 Power-of-Two Cyclotomic Fields -- 2.5 NTRU Lattices -- 3 Hash-and-Sign over NTRU Lattices -- 3.1 The KGPV Sampler and Its Variant -- 4 Side-Channel Attack Against Trapdoor Samplers: A Roadmap -- 5 Recovering Totally Positive Elements -- 5.1 Case of the Power Basis -- 5.2 Case of the Bit-Reversed Order Basis -- 6 Side-Channel Leakage of the Gram-Schmidt Norms -- 6.1 Leakage in the DLP Scheme -- 6.2 Leakage in the Falcon Scheme -- 7 Practical Attack Against the DLP Scheme -- 7.1 Totally Positive Recovery with Noisy Inputs 7.2 Practical Tweaks in the DLP Setting -- 7.3 Experimental Results -- 7.4 Precision Required on the Gram-Schmidt Norms -- 8 Conclusion and Future Work -- References -- An Algebraic Attack on Rank Metric Code-Based Cryptosystems -- 1 Introduction -- 2 Notation -- 3 Algebraic Modellings of the Decoding Problem -- 3.1 Solving the MinRank Instance Using Kipnis-Shamir's Modelling -- 3.2 Syndrome Modelling -- 3.3 Ourivski-Johansson's Modelling -- 4 Gröbner Bases and Degree Falls -- 5 Degree Falls and Low Degree Equations -- 5.1 Degree Falls from the Kernel of the Jacobian 5.2 Analysis of the Ideal MaxMinors(C2-C1 R) -- 6 Experimental Results, Complexity Bounds, and Security -- 6.1 Experimental Results -- 6.2 Complexity Analysis and Security over F2 -- 7 Conclusion -- References -- Low Weight Discrete Logarithm and Subset Sum in 20.65n with Polynomial Memory -- 1 Introduction -- 2 Preliminaries -- 3 A Generalized View on the BCJ Subset Sum Algorithm -- 3.1 Improved Low Weight DLP Algorithm -- 4 Subset Sum in 20.65n with Polynomial Space -- 4.1 Nested Collision Subset Sum in 20.649n -- 4.2 Improved Nested Collision Subset Sum in 20.645n … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Extent:
- 1 online resource (823 p.)
- Subjects:
- 005.8/24
Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Electronic books
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783030457273
3030457273 - Related ISBNs:
- 9783030457266
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.508530
- Ingest File:
- 03_085.xml