Limits of Lattice-based Cryptography: A New Era of Hinted and Structured Assumptions

Search results

  • 2025

    Evasive LWE Assumptions: Definitions, Classes, and Counterexamples

    Brzuska, C., Ünal, A. & Woo, I. K. Y., 2025, Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Chung, K.-M. & Sasaki, Y. (eds.). Springer, Vol. 4. p. 418-449 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15487 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • Lattice-based Multi-Authority/Client Attribute-based Encryption for Circuits

    Cini, V., Lai, R. & Woo, I., 13 Jan 2025, In: IACR Communications in Cryptology. 1, 4, p. 1-67 67 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    54 Downloads (Pure)
  • On Bounded Storage Key Agreement and One-Way Functions

    Brzuska, C., Couteau, G., Egger, C. & Quach, W., 2025, Theory of Cryptography - 22nd International Conference, TCC 2024, Proceedings. Boyle, E., Boyle, E. & Mahmoody, M. (eds.). Springer, p. 287-318 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15364 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness

    Brzuska, C. & Couteau, G., Jan 2025, In: Journal of Cryptology. 38, 1, 8.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access