Ring-LWE Cryptography for the Number Theorist

6Citations
Citations of this article
37Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we survey the status of attacks on the ring and polynomial learning with errors problems (RLWE and PLWE). Recent work on the security of these problems (Eisentraeger et al., Weak Instances of PLWE. In: Proceedings of the selected areas of cryptography 2014. Lecture notes in computer science. Springer, New York, 2014; Elias Y., Lauter K., Ozman E., Stange K., Provably weak instances of ring-LWE. In: Advances in Cryptology – CRYPTO 2015. Springer, 2015 gives rise to interesting questions about number fields. We extend these attacks and survey related open problems in number theory, including spectral distortion of an algebraic number and its relationship to Mahler measure, the monogenic property for the ring of integers of a number field, and the size of elements of small order modulo q.

Cite

CITATION STYLE

APA

Elias, Y., Lauter, K. E., Ozman, E., & Stange, K. E. (2016). Ring-LWE Cryptography for the Number Theorist. In Association for Women in Mathematics Series (Vol. 3, pp. 271–290). Springer. https://doi.org/10.1007/978-3-319-30976-7_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free