SlideShare a Scribd company logo
1 of 90
Download to read offline
An introduction to
lattice-based cryptography
Thijs Laarhoven
mail@thijs.com
http://www.thijs.com/
(Slides from July 2019)
Outline
Lattices
Lattice-based signatures
Lattice algorithms
Summary
References
Outline
Lattices
Lattice-based signatures
Lattice algorithms
Summary
References
Lattices
What is a lattice?
O
Lattices
What is a lattice?
b1
b2
O
Lattices
What is a lattice?
b1
b2
O
Lattices
What is a lattice?
r1
r2
O
Lattices
Basis for the same lattice
v1
v2
O
Lattices
Basis for a sublattice
v1
v2
O
Lattices
Basis for a sublattice
v1
v2
O
Lattices
Basis for a sublattice
b1
b2
s
O
Lattices
Shortest Vector Problem (SVP)
b1
b2
s
-s O
Lattices
Shortest Vector Problem (SVP)
b1
b2
t
O
Lattices
Closest Vector Problem (CVP)
t
b1
b2
O
Lattices
Closest Vector Problem (CVP)
t
b1
b2
O
Lattices
Closest Vector Problem (CVP)
r1
r2
b1
b2
O
Lattices
Lattice basis reduction
r1
r2
O
Lattices
Finding closest vectors (good basis)
r1
r2
O
Lattices
Finding closest vectors (good basis)
r1
r2
O
t
Lattices
Finding closest vectors (good basis)
r1
r2
O
t
Lattices
Finding closest vectors (good basis)
r1
r2
O
t
v
Lattices
Finding closest vectors (good basis)
b1
b2
O
Lattices
Finding closest vectors (bad basis)
b1
b2
O
Lattices
Finding closest vectors (bad basis)
b1
b2
O
t
Lattices
Finding closest vectors (bad basis)
b1
b2
O
t
Lattices
Finding closest vectors (bad basis)
b1
b2
O
t
v
Lattices
Finding closest vectors (bad basis)
Lattices
Lattice problems
Easy lattice problems:
• Given a good basis, finding a bad basis
• Given a good basis, finding short lattice vectors
• Given a good basis, finding close lattice vectors
• Given any basis, verifying membership of the lattice
Lattices
Lattice problems
Easy lattice problems:
• Given a good basis, finding a bad basis
• Given a good basis, finding short lattice vectors
• Given a good basis, finding close lattice vectors
• Given any basis, verifying membership of the lattice
Hard lattice problems:
• Given a bad basis, finding a good basis
• Given a bad basis, finding short lattice vectors
• Given a bad basis, finding close lattice vectors
Outline
Lattices
Lattice-based signatures
Lattice algorithms
Summary
References
Lattice-based signatures
Overview [GGH97]
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
O
Lattice-based signatures
Private key
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
r1
r2
O
Lattice-based signatures
Private key
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
r1
r2
O
Lattice-based signatures
Private key
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
r1
r2
O
Lattice-based signatures
Public key
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
r1
r2
b1
b2
O
Lattice-based signatures
Public key
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
b1
b2
r1
r2
O
Lattice-based signatures
Signing a message
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
b1
b2
r1
r2
O
c
Lattice-based signatures
Signing a message
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
b1
b2
r1
r2
O
c
Lattice-based signatures
Signing a message
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
b1
b2
r1
r2
O
c
Lattice-based signatures
Signing a message
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
b1
b2
r1
r2
O
s
c
Lattice-based signatures
Signing a message
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
r1
r2
b1
b2
O
s
c
Lattice-based signatures
Verifying a signature
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
r1
r2
b1
b2
O
s
c
Lattice-based signatures
Verifying a signature
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
r1
r2
b1
b2
O
s
c
Lattice-based signatures
Overview
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
r1
r2
b1
b2
O
s
c
Lattice-based signatures
Attacking the scheme [NR06]
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
Obtain error vectors:
s = Sign(m)
c = H(m)
e = c − s
Leaks R = {r1,...,rd}:
e ∈ D(R)
Can recover R via
gradient descent
O
s
c
Lattice-based signatures
Obtain a signature
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
Obtain error vectors:
s = Sign(m)
c = H(m)
e = c − s
Leaks R = {r1,...,rd}:
e ∈ D(R)
Can recover R via
gradient descent
e
O
s
c
Lattice-based signatures
Compute the error vector
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
Obtain error vectors:
s = Sign(m)
c = H(m)
e = c − s
Leaks R = {r1,...,rd}:
e ∈ D(R)
Can recover R via
gradient descent
O
Lattice-based signatures
Store the error vector
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
Obtain error vectors:
s = Sign(m)
c = H(m)
e = c − s
Leaks R = {r1,...,rd}:
e ∈ D(R)
Can recover R via
gradient descent
O
s
c
Lattice-based signatures
Obtain a signature
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
Obtain error vectors:
s = Sign(m)
c = H(m)
e = c − s
Leaks R = {r1,...,rd}:
e ∈ D(R)
Can recover R via
gradient descent
e
O
s
c
Lattice-based signatures
Compute the error vector
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
Obtain error vectors:
s = Sign(m)
c = H(m)
e = c − s
Leaks R = {r1,...,rd}:
e ∈ D(R)
Can recover R via
gradient descent
O
Lattice-based signatures
Store the error vector
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
Obtain error vectors:
s = Sign(m)
c = H(m)
e = c − s
Leaks R = {r1,...,rd}:
e ∈ D(R)
Can recover R via
gradient descent
O
s
c
Lattice-based signatures
Obtain a signature
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
Obtain error vectors:
s = Sign(m)
c = H(m)
e = c − s
Leaks R = {r1,...,rd}:
e ∈ D(R)
Can recover R via
gradient descent
e
O
s
c
Lattice-based signatures
Compute the error vector
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
Obtain error vectors:
s = Sign(m)
c = H(m)
e = c − s
Leaks R = {r1,...,rd}:
e ∈ D(R)
Can recover R via
gradient descent
O
Lattice-based signatures
Store the error vector
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
Obtain error vectors:
s = Sign(m)
c = H(m)
e = c − s
Leaks R = {r1,...,rd}:
e ∈ D(R)
Can recover R via
gradient descent
O
Lattice-based signatures
Obtain many error vectors
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
Obtain error vectors:
s = Sign(m)
c = H(m)
e = c − s
Leaks R = {r1,...,rd}:
e ∈ D(R)
Can recover R via
gradient descent
O
Lattice-based signatures
Obtain many error vectors
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
Obtain error vectors:
s = Sign(m)
c = H(m)
e = c − s
Leaks R = {r1,...,rd}:
e ∈ D(R)
Can recover R via
gradient descent
O
Lattice-based signatures
Obtain many error vectors
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
Obtain error vectors:
s = Sign(m)
c = H(m)
e = c − s
Leaks R = {r1,...,rd}:
e ∈ D(R)
Can recover R via
gradient descent
O
Lattice-based signatures
Obtain many error vectors
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
Obtain error vectors:
s = Sign(m)
c = H(m)
e = c − s
Leaks R = {r1,...,rd}:
e ∈ D(R)
Can recover R via
gradient descent
r1
r2
O
Lattice-based signatures
Recover the private key
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
Obtain error vectors:
s = Sign(m)
c = H(m)
e = c − s
Leaks R = {r1,...,rd}:
e ∈ D(R)
Can recover R via
gradient descent
r1
r2
O
Lattice-based signatures
Recover the private key
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
Obtain error vectors:
s = Sign(m)
c = H(m)
e = c − s
Leaks R = {r1,...,rd}:
e ∈ D(R)
Can recover R via
gradient descent
r1
r2
b1
b2
O
s
c
Lattice-based signatures
Overview
Private key:
R = {r1,...,rn}
Public key:
B = {b1,...,bn}
Signing m:
c = H(m)
s = R R−1
c
Verifying s:
s ∈ L
s − H(m) small
Obtain error vectors:
s = Sign(m)
c = H(m)
e = c − s
Leaks R = {r1,...,rd}:
e ∈ D(R)
Can recover R via
gradient descent
Outline
Lattices
Lattice-based signatures
Lattice algorithms
Summary
References
b1
b2
O
Lattice algorithms
Lattice enumeration [FP85]
b1
b2
O
Lattice algorithms
Determine possible coefficients of b2
b1
b2
O
Lattice algorithms
Determine possible coefficients of b2
b1
b2
O
Lattice algorithms
Determine possible coefficients of b2
b1
b2
O
Lattice algorithms
Determine possible coefficients of b2
b1
*
b2
*
O
Lattice algorithms
Determine possible coefficients of b2
b1
*
b2
*
O
Lattice algorithms
Determine possible coefficients of b2
b1
*
b2
*
O
Lattice algorithms
Find short vectors for each coefficient of b2
O
Lattice algorithms
Find short vectors for each coefficient of b2
O
Lattice algorithms
Find short vectors for each coefficient of b2
v1
-v1
O
Lattice algorithms
Find short vectors for each coefficient of b2
v1
-v1
O
Lattice algorithms
Find short vectors for each coefficient of b2
v1
-v1
v2
v3
O
Lattice algorithms
Find short vectors for each coefficient of b2
v1
-v1
v2
v3
O
Lattice algorithms
Find short vectors for each coefficient of b2
v1
-v1
v2
v3
v4
v5
O
Lattice algorithms
Find short vectors for each coefficient of b2
v1
-v1
v2
v3
v4
v5
O
Lattice algorithms
Find short vectors for each coefficient of b2
v1
-v1
v2
v3
v4
v5
v6O
Lattice algorithms
Find short vectors for each coefficient of b2
v1
-v1
v2
v3
v4
v5
v6O
Lattice algorithms
Find short vectors for each coefficient of b2
v1
-v1
v2
v3
v4
v5
v6-v2
-v3
-v4
-v5-v6
O
Lattice algorithms
Find short vectors for each coefficient of b2
v1
-v1
v2
v3
v4
v5
v6-v2
-v3
-v4
-v5-v6
O
Lattice algorithms
Find a shortest vector among all found vectors
v1
-v1
s
v3
v4
v5
v6-s
-v3
-v4
-v5-v6
O
Lattice algorithms
Find a shortest vector among all found vectors
Lattice algorithms
Lattice enumeration vs. lattice sieving
Lattice enumeration
• Brute-force all combinations of the basis vectors [FP85]
• Each coordinate 2O(n)
options =⇒ 2O(n2
)
time complexity
• Balance preprocessing time with search time: 2O(nlogn)
time [Kan83]
• Requires almost no memory
Lattice algorithms
Lattice enumeration vs. lattice sieving
Lattice enumeration
• Brute-force all combinations of the basis vectors [FP85]
• Each coordinate 2O(n)
options =⇒ 2O(n2
)
time complexity
• Balance preprocessing time with search time: 2O(nlogn)
time [Kan83]
• Requires almost no memory
Lattice sieving
• Combine vectors in a huge list to find shorter vectors [AKS01]
• Generally requires 2O(n)
time and 2O(n)
space
• Current best asymptotics: 20.292n+o(n)
time and space [BDGL16]
Lattice algorithms
Practice [SVP]
■ ■
■
■
■
■ ■
■
■
■
■
■
■
■■
■
■
■
■
■
■
■
■
■
■
■
■ ■
▼
▼
▼
▼
▼
▼ ▼
▼
▼
▼
▼
▼
▼
▼▼▼
▼
▼▼
★
★★
★
★
★
★
★
★
★
★
★
★
★
★
★
★
★
★
♢
♢
♢
♢
♢♢
♢♢♢
♢
♢♢
♢
♢
♢
♢♢
♢
♢
■ Enumeration (continuous pruning)
▼ Enumeration (discrete pruning)
★ Sieving (old)
♢ Sieving (new)
80 100 120 140 160
100
104
106
108
1010
→ Lattice dimension
→Singlecoretimings(seconds)
1 hour
1 day
1 year
1 century
Lattice algorithms
Concrete estimates
Most common hardness estimates:
• Cost of finding nice basis (n) ≥ Cost of sieving/enumeration (β)
• Ignore space complexity, ignore o(β) in time complexity
• Classical sieving: 20.292β
time [BDGL16]
• Quantum sieving: 20.265β
time [Laa16]
Outline
Lattices
Lattice-based signatures
Lattice algorithms
Summary
References
Summary
Lattice-based cryptography
• Main principle: hard to find good bases from bad bases
Private key: Good lattice basis
Public key: Bad lattice basis
• Signatures: Decode with good basis to nearby lattice point
Lattice-based cryptanalysis
• Two flavors, trading time for memory
Enumeration: Low memory, slower in high dimensions
Sieving: High memory, faster in practice
• Security estimates: solving SVP/CVP takes ≥ 20.292n
time
References (clickable)
Lattice-based cryptography
• General: [MG02], [MR09], [Mic16], [Pei16], [NIST]
• Signatures: [GGH97], [NR06], [DN12]
• NTRU: [HPS98], [HHPW10], [SS11], [BCLV17]
• LWE: [Reg05], [Reg10], [BCD+16]
• Ring-LWE: [SSTX09], [LPR10], [LPR13]
• (Ring-)LWR: [BPR13], [AKPW13], [AKRV17], [BBF+17]
Lattice-based cryptanalysis
• General: [MG02], [MR09], [HPS11], [Mic16], [ACD+18], [SVP]
• Enumeration: [FP85], [Kan83], [GNR10], [AN17], [ANS18]
• Sieving: [AKS01], [LMP15], [BDGL16], [Laa16], [Duc18], [ADH+19]
• Basis reduction: [LLL82], [SE94], [CN11]

More Related Content

What's hot

Digital Signature Standard
Digital Signature StandardDigital Signature Standard
Digital Signature StandardSou Jana
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewRamesh Nagappan
 
PRIM’S AND KRUSKAL’S ALGORITHM
PRIM’S AND KRUSKAL’S  ALGORITHMPRIM’S AND KRUSKAL’S  ALGORITHM
PRIM’S AND KRUSKAL’S ALGORITHMJaydeepDesai10
 
Introduction to Approximation Algorithms
Introduction to Approximation AlgorithmsIntroduction to Approximation Algorithms
Introduction to Approximation AlgorithmsJhoirene Clemente
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication CodesDarshanPatil82
 
The Singular Value Decomposition theroy + example
 The Singular Value Decomposition theroy + example  The Singular Value Decomposition theroy + example
The Singular Value Decomposition theroy + example shivam choubey
 
Prims & kruskal algorithms
Prims & kruskal algorithmsPrims & kruskal algorithms
Prims & kruskal algorithmsAyesha Tahir
 
GRAPH APPLICATION - MINIMUM SPANNING TREE (MST)
GRAPH APPLICATION - MINIMUM SPANNING TREE (MST)GRAPH APPLICATION - MINIMUM SPANNING TREE (MST)
GRAPH APPLICATION - MINIMUM SPANNING TREE (MST)Madhu Bala
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve CryptographyJorgeVillamarin5
 
Sequence to Sequence Learning with Neural Networks
Sequence to Sequence Learning with Neural NetworksSequence to Sequence Learning with Neural Networks
Sequence to Sequence Learning with Neural NetworksNguyen Quang
 
Machine Learning: Generative and Discriminative Models
Machine Learning: Generative and Discriminative ModelsMachine Learning: Generative and Discriminative Models
Machine Learning: Generative and Discriminative Modelsbutest
 
Simulated annealing in n - queens
Simulated annealing in n - queensSimulated annealing in n - queens
Simulated annealing in n - queensHemant Chetwani
 
vdocument.in_prof-saroj-kaushik1-introduction-to-artificial-intelligence-lect...
vdocument.in_prof-saroj-kaushik1-introduction-to-artificial-intelligence-lect...vdocument.in_prof-saroj-kaushik1-introduction-to-artificial-intelligence-lect...
vdocument.in_prof-saroj-kaushik1-introduction-to-artificial-intelligence-lect...akshaya870130
 
Local beam search example
Local beam search exampleLocal beam search example
Local beam search exampleMegha Sharma
 

What's hot (20)

Digital Signature Standard
Digital Signature StandardDigital Signature Standard
Digital Signature Standard
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 
Divide and Conquer
Divide and ConquerDivide and Conquer
Divide and Conquer
 
PRIM’S AND KRUSKAL’S ALGORITHM
PRIM’S AND KRUSKAL’S  ALGORITHMPRIM’S AND KRUSKAL’S  ALGORITHM
PRIM’S AND KRUSKAL’S ALGORITHM
 
Viterbi algorithm
Viterbi algorithmViterbi algorithm
Viterbi algorithm
 
Introduction to Approximation Algorithms
Introduction to Approximation AlgorithmsIntroduction to Approximation Algorithms
Introduction to Approximation Algorithms
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
The Singular Value Decomposition theroy + example
 The Singular Value Decomposition theroy + example  The Singular Value Decomposition theroy + example
The Singular Value Decomposition theroy + example
 
Prims & kruskal algorithms
Prims & kruskal algorithmsPrims & kruskal algorithms
Prims & kruskal algorithms
 
GRAPH APPLICATION - MINIMUM SPANNING TREE (MST)
GRAPH APPLICATION - MINIMUM SPANNING TREE (MST)GRAPH APPLICATION - MINIMUM SPANNING TREE (MST)
GRAPH APPLICATION - MINIMUM SPANNING TREE (MST)
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
Minimum spanning Tree
Minimum spanning TreeMinimum spanning Tree
Minimum spanning Tree
 
Sequence to Sequence Learning with Neural Networks
Sequence to Sequence Learning with Neural NetworksSequence to Sequence Learning with Neural Networks
Sequence to Sequence Learning with Neural Networks
 
Machine Learning: Generative and Discriminative Models
Machine Learning: Generative and Discriminative ModelsMachine Learning: Generative and Discriminative Models
Machine Learning: Generative and Discriminative Models
 
Simulated annealing in n - queens
Simulated annealing in n - queensSimulated annealing in n - queens
Simulated annealing in n - queens
 
Alpha beta pruning
Alpha beta pruningAlpha beta pruning
Alpha beta pruning
 
vdocument.in_prof-saroj-kaushik1-introduction-to-artificial-intelligence-lect...
vdocument.in_prof-saroj-kaushik1-introduction-to-artificial-intelligence-lect...vdocument.in_prof-saroj-kaushik1-introduction-to-artificial-intelligence-lect...
vdocument.in_prof-saroj-kaushik1-introduction-to-artificial-intelligence-lect...
 
Local beam search example
Local beam search exampleLocal beam search example
Local beam search example
 
P vs NP
P vs NP P vs NP
P vs NP
 
Traveling Salesman Problem
Traveling Salesman Problem Traveling Salesman Problem
Traveling Salesman Problem
 

Similar to An introduction to lattice-based cryptography

Signyourd digital signature certificate provider
Signyourd   digital signature certificate providerSignyourd   digital signature certificate provider
Signyourd digital signature certificate providerKishankant Yadav
 
Reed solomon Encoder and Decoder
Reed solomon Encoder and DecoderReed solomon Encoder and Decoder
Reed solomon Encoder and DecoderAmeer H Ali
 
Linear block coding
Linear block codingLinear block coding
Linear block codingjknm
 
Class 11: Deeper List Procedures
Class 11: Deeper List ProceduresClass 11: Deeper List Procedures
Class 11: Deeper List ProceduresDavid Evans
 
Efficient Random-Walk Methods forApproximating Polytope Volume
Efficient Random-Walk Methods forApproximating Polytope VolumeEfficient Random-Walk Methods forApproximating Polytope Volume
Efficient Random-Walk Methods forApproximating Polytope VolumeVissarion Fisikopoulos
 
Certified bit coded regular expression parsing
Certified bit coded regular expression parsingCertified bit coded regular expression parsing
Certified bit coded regular expression parsingrodrigogribeiro
 
Volume and edge skeleton computation in high dimensions
Volume and edge skeleton computation in high dimensionsVolume and edge skeleton computation in high dimensions
Volume and edge skeleton computation in high dimensionsVissarion Fisikopoulos
 
Computer Software: Compiler Construction Lecture 05.ppt
Computer Software: Compiler Construction Lecture 05.pptComputer Software: Compiler Construction Lecture 05.ppt
Computer Software: Compiler Construction Lecture 05.pptishaquet82
 
3. Relational Models in DBMS
3. Relational Models in DBMS3. Relational Models in DBMS
3. Relational Models in DBMSkoolkampus
 
Module 2 - part i
Module   2 - part iModule   2 - part i
Module 2 - part iParthNavale
 
Data integration and provenance-Chapter-14
Data integration and provenance-Chapter-14Data integration and provenance-Chapter-14
Data integration and provenance-Chapter-14saadhash286
 
Formal Verification of Programming Languages
Formal Verification of Programming LanguagesFormal Verification of Programming Languages
Formal Verification of Programming LanguagesJason Reich
 
Data analysis with R
Data analysis with RData analysis with R
Data analysis with RShareThis
 

Similar to An introduction to lattice-based cryptography (20)

Signyourd digital signature certificate provider
Signyourd   digital signature certificate providerSignyourd   digital signature certificate provider
Signyourd digital signature certificate provider
 
Reed solomon Encoder and Decoder
Reed solomon Encoder and DecoderReed solomon Encoder and Decoder
Reed solomon Encoder and Decoder
 
Linear block coding
Linear block codingLinear block coding
Linear block coding
 
Class 11: Deeper List Procedures
Class 11: Deeper List ProceduresClass 11: Deeper List Procedures
Class 11: Deeper List Procedures
 
Lex analysis
Lex analysisLex analysis
Lex analysis
 
R Language Introduction
R Language IntroductionR Language Introduction
R Language Introduction
 
Cs501 rel algebra
Cs501 rel algebraCs501 rel algebra
Cs501 rel algebra
 
Efficient Random-Walk Methods forApproximating Polytope Volume
Efficient Random-Walk Methods forApproximating Polytope VolumeEfficient Random-Walk Methods forApproximating Polytope Volume
Efficient Random-Walk Methods forApproximating Polytope Volume
 
Certified bit coded regular expression parsing
Certified bit coded regular expression parsingCertified bit coded regular expression parsing
Certified bit coded regular expression parsing
 
Volume and edge skeleton computation in high dimensions
Volume and edge skeleton computation in high dimensionsVolume and edge skeleton computation in high dimensions
Volume and edge skeleton computation in high dimensions
 
Computer Software: Compiler Construction Lecture 05.ppt
Computer Software: Compiler Construction Lecture 05.pptComputer Software: Compiler Construction Lecture 05.ppt
Computer Software: Compiler Construction Lecture 05.ppt
 
Lllll
LllllLllll
Lllll
 
3. Relational Models in DBMS
3. Relational Models in DBMS3. Relational Models in DBMS
3. Relational Models in DBMS
 
Module 2 - part i
Module   2 - part iModule   2 - part i
Module 2 - part i
 
User Account Access Graphs
User Account Access GraphsUser Account Access Graphs
User Account Access Graphs
 
Data integration and provenance-Chapter-14
Data integration and provenance-Chapter-14Data integration and provenance-Chapter-14
Data integration and provenance-Chapter-14
 
Formal Verification of Programming Languages
Formal Verification of Programming LanguagesFormal Verification of Programming Languages
Formal Verification of Programming Languages
 
Data analysis with R
Data analysis with RData analysis with R
Data analysis with R
 
relational algebra
relational algebrarelational algebra
relational algebra
 
Avr instruction set
Avr instruction setAvr instruction set
Avr instruction set
 

Recently uploaded

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 

Recently uploaded (20)

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

An introduction to lattice-based cryptography