Limits of Lattice-based Cryptography: A New Era of Hinted and Structured Assumptions

Project Details

AcronymBrzuska ICT
StatusActive
Effective start/end date01/01/202431/12/2026

Fingerprint

Explore the research topics touched on by this project. These labels are generated based on the underlying awards/grants. Together they form a unique fingerprint.
  • Evasive LWE Assumptions: Definitions, Classes, and Counterexamples

    Brzuska, C., Ünal, A. & Woo, I. K. Y., 2025, Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Chung, K.-M. & Sasaki, Y. (eds.). Springer, Vol. 4. p. 418-449 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15487 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • Lattice-based Multi-Authority/Client Attribute-based Encryption for Circuits

    Cini, V., Lai, R. & Woo, I., 13 Jan 2025, In: IACR Communications in Cryptology. 1, 4, p. 1-67 67 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    26 Downloads (Pure)
  • On Bounded Storage Key Agreement and One-Way Functions

    Brzuska, C., Couteau, G., Egger, C. & Quach, W., 2025, Theory of Cryptography - 22nd International Conference, TCC 2024, Proceedings. Boyle, E., Boyle, E. & Mahmoody, M. (eds.). Springer, p. 287-318 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15364 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access