2015
DOI: 10.1109/tit.2015.2475738
|View full text |Cite
|
Sign up to set email alerts
|

A New Algorithm for Solving Ring-LPN With a Reducible Polynomial

Abstract: The LPN (Learning Parity with Noise) problem has recently proved to be of great importance in cryptology. A special and very useful case is the RING-LPN problem, which typically provides improved efficiency in the constructed cryptographic primitive. We present a new algorithm for solving the RING-LPN problem in the case when the polynomial used is reducible. It greatly outperforms previous algorithms for solving this problem. Using the algorithm, we can break the Lapin authentication protocol for the proposed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
10
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 26 publications
1
10
0
Order By: Relevance
“…The discrepancy comes from the worst-case analysis of the reduction phase where we say that at each reduction step we discard 2 b queries. With this reasoning, we predict to lose 2 24 queries. If we analyse more closely, we discover 24 .…”
Section: Remarkmentioning
confidence: 93%
See 2 more Smart Citations
“…The discrepancy comes from the worst-case analysis of the reduction phase where we say that at each reduction step we discard 2 b queries. With this reasoning, we predict to lose 2 24 queries. If we analyse more closely, we discover 24 .…”
Section: Remarkmentioning
confidence: 93%
“…With this reasoning, we predict to lose 2 24 queries. If we analyse more closely, we discover 24 . We are left with 2 14.45 , queries which are sufficient for the solving phase.…”
Section: Remarkmentioning
confidence: 93%
See 1 more Smart Citation
“…We show the experimental results in this part, using a [46,24] linear code that is a concatenation of two binary [23,12] Golay codes 17 for the subspace hypothesis testing procedure.…”
Section: Methodsmentioning
confidence: 99%
“…where ε PSSI + is the bound on the successful probability that the PPT adversary solves the PSSI + problem. (1) To avoid attacks [31,[37][38][39] and according to [28], m and n must be two different primes, and…”
Section: Proof Of Securitymentioning
confidence: 99%