{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T17:45:28Z","timestamp":1775756728933,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T00:00:00Z","timestamp":1573430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Samsung Research Funding Center of Samsung Electronics","award":["SRFC- TB1403-52"],"award-info":[{"award-number":["SRFC- TB1403-52"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,11]]},"DOI":"10.1145\/3338469.3358941","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T19:43:22Z","timestamp":1573155802000},"page":"11-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Revisiting the Hybrid Attack on Sparse Secret LWE and Application to HE Parameters"],"prefix":"10.1145","author":[{"given":"Yongha","family":"Son","sequence":"first","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}]},{"given":"Jung Hee","family":"Cheon","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2019,11,11]]},"reference":[{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56614-6_4"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_11"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2015-0016"},{"key":"e_1_3_2_1_5_1","volume-title":"Ricardini","author":"Alkim Erdem","year":"2019","unstructured":"Erdem Alkim , Paulo S. L. M. Barreto , Nina Bindel , Patrick Longa , and Jefferson E . Ricardini . 2019 . The Lattice-Based Digital Signature Scheme qTESLA. Cryptology ePrint Archive, Report 2019\/085. https:\/\/eprint.iacr.org\/2019\/085. Erdem Alkim, Paulo S. L. M. Barreto, Nina Bindel, Patrick Longa, and Jefferson E. Ricardini. 2019. The Lattice-Based Digital Signature Scheme qTESLA. Cryptology ePrint Archive, Report 2019\/085. https:\/\/eprint.iacr.org\/2019\/085."},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of USENIX Security `16","author":"Alkim Erdem","year":"2016","unstructured":"Erdem Alkim , L\u00e9o Ducas , Thomas P\u00f6ppelmann , and Peter Schwabe . 2016 . Post-quantum Key Exchange--A New Hope . In Proc. of USENIX Security `16 . USENIX Association, 327--343. Erdem Alkim, L\u00e9o Ducas, Thomas P\u00f6ppelmann, and Peter Schwabe. 2016. Post-quantum Key Exchange--A New Hope. In Proc. of USENIX Security `16. USENIX Association, 327--343."},{"key":"e_1_3_2_1_7_1","volume-title":"Post-Quantum Cryptography,","author":"Baan Hayo","unstructured":"Hayo Baan , Sauvik Bhattacharya , Scott Fluhrer , Oscar Garcia-Morchon , Thijs Laarhoven , Ronald Rietman , Markku-Juhani O. Saarinen , Ludo Tolhuizen , and Zhenfei Zhang . 2019. Round 5: Compact and Fast Post-quantum Public-Key Encryption . In Post-Quantum Cryptography, , Jintai Ding and Rainer Steinwandt (Eds.). Springer International Publishing , Cham , 83--102. Hayo Baan, Sauvik Bhattacharya, Scott Fluhrer, Oscar Garcia-Morchon, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, and Zhenfei Zhang. 2019. Round 5: Compact and Fast Post-quantum Public-Key Encryption. In Post-Quantum Cryptography,, Jintai Ding and Rainer Steinwandt (Eds.). Springer International Publishing, Cham, 83--102."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02579403"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08344-5_21"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974331.ch2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31517-1_2"},{"key":"e_1_3_2_1_13_1","volume-title":"Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Chen Hao","year":"2019","unstructured":"Hao Chen , Ilaria Chillotti , and Yongsoo Song . 2019. Improved Bootstrapping for Approximate Homomorphic Encryption . In Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques , Darmstadt, Germany , May 19--23, 2019 , Proceedings, Part II. 34--54. Hao Chen, Ilaria Chillotti, and Yongsoo Song. 2019. Improved Bootstrapping for Approximate Homomorphic Encryption. In Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19--23, 2019, Proceedings, Part II. 34--54."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78381-9_14"},{"key":"e_1_3_2_1_17_1","unstructured":"Jung Hee Cheon Kyoohyung Han Andrey Kim Miran Kim and Yongsoo Song. 2019. Snucrypto HEAAN. https:\/\/github.com\/homenc\/HElib .  Jung Hee Cheon Kyoohyung Han Andrey Kim Miran Kim and Yongsoo Song. 2019. Snucrypto HEAAN. https:\/\/github.com\/homenc\/HElib ."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98113-0_9"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"e_1_3_2_1_21_1","volume-title":"Crystals-dilithium: A lattice-based digital signature scheme. IACR Transactions on Cryptographic Hardware and Embedded Systems","author":"Ducas L\u00e9o","year":"2018","unstructured":"L\u00e9o Ducas , Eike Kiltz , Tancrede Lepoint , Vadim Lyubashevsky , Peter Schwabe , Gregor Seiler , and Damien Stehl\u00e9 . 2018 . Crystals-dilithium: A lattice-based digital signature scheme. IACR Transactions on Cryptographic Hardware and Embedded Systems (2018), 238--268. L\u00e9o Ducas, Eike Kiltz, Tancrede Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, and Damien Stehl\u00e9. 2018. Crystals-dilithium: A lattice-based digital signature scheme. IACR Transactions on Cryptographic Hardware and Embedded Systems (2018), 238--268."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_31"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_25"},{"key":"e_1_3_2_1_25_1","unstructured":"Shai Halevi and Victor Shoup. 2019. HElib. https:\/\/github.com\/homenc\/HElib .  Shai Halevi and Victor Shoup. 2019. HElib. https:\/\/github.com\/homenc\/HElib ."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01957-9_27"},{"key":"e_1_3_2_1_27_1","volume-title":"Cryptographers' Track at the RSA Conference","author":"Hoffstein Jeff","unstructured":"Jeff Hoffstein , Jill Pipher , John M Schanck , Joseph H Silverman , William Whyte , and Zhenfei Zhang . 2017. Choosing parameters for NTRUEncrypt . In Cryptographers' Track at the RSA Conference . Springer , 3--18. Jeff Hoffstein, Jill Pipher, John M Schanck, Joseph H Silverman, William Whyte, and Zhenfei Zhang. 2017. Choosing parameters for NTRUEncrypt. In Cryptographers' Track at the RSA Conference. Springer, 3--18."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054868"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74143-5_9"},{"key":"e_1_3_2_1_30_1","volume-title":"Minkowski's convex body theorem and integer programming. Mathematics of operations research","author":"Kannan Ravi","year":"1987","unstructured":"Ravi Kannan . 1987. Minkowski's convex body theorem and integer programming. Mathematics of operations research , Vol. 12 , 3 ( 1987 ), 415--440. Ravi Kannan. 1987. Minkowski's convex body theorem and integer programming. Mathematics of operations research, Vol. 12, 3 (1987), 415--440."},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. of CT-RSA' 11","author":"Lindner Richard","unstructured":"Richard Lindner and Chris Peikert . 2011. Better Key Sizes (and Attacks) for LWE-Based Encryption .. In Proc. of CT-RSA' 11 , Vol. 65-- 58 . Springer , 319--339. Richard Lindner and Chris Peikert. 2011. Better Key Sizes (and Attacks) for LWE-Based Encryption.. In Proc. of CT-RSA' 11, Vol. 65--58. Springer, 319--339."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"e_1_3_2_1_33_1","unstructured":"SEAL 2019. Microsoft SEAL (release 3.3). https:\/\/github.com\/Microsoft\/SEAL.Microsoft Research Redmond WA  SEAL 2019. Microsoft SEAL (release 3.3). https:\/\/github.com\/Microsoft\/SEAL.Microsoft Research Redmond WA"},{"key":"e_1_3_2_1_34_1","volume-title":"NIST Post-Quantum Cryptography Standardization. https:\/\/csrc.nist.gov\/Projects\/Post-Quantum-Cryptography","author":"SEAL","unstructured":"SEAL 2019. NIST Post-Quantum Cryptography Standardization. https:\/\/csrc.nist.gov\/Projects\/Post-Quantum-Cryptography . NIST , Gaithersburg, MD . SEAL 2019. NIST Post-Quantum Cryptography Standardization. https:\/\/csrc.nist.gov\/Projects\/Post-Quantum-Cryptography. NIST, Gaithersburg, MD."},{"key":"e_1_3_2_1_35_1","volume-title":"Huaxiong Wang, Shu Qin Ren, and Khin Mi Mi Aung.","author":"Meng Tan Benjamin Hong","year":"2019","unstructured":"Benjamin Hong Meng Tan , Hyung Tae Lee , Huaxiong Wang, Shu Qin Ren, and Khin Mi Mi Aung. 2019 . Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields. Cryptology ePrint Archive, Report 2019\/332. https:\/\/eprint.iacr.org\/2019\/332. Benjamin Hong Meng Tan, Hyung Tae Lee, Huaxiong Wang, Shu Qin Ren, and Khin Mi Mi Aung. 2019. Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields. Cryptology ePrint Archive, Report 2019\/332. https:\/\/eprint.iacr.org\/2019\/332."}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 7th ACM Workshop on Encrypted Computing &amp; Applied Homomorphic Cryptography"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338469.3358941","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338469.3358941","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:48Z","timestamp":1750201968000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338469.3358941"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,11]]},"references-count":33,"alternative-id":["10.1145\/3338469.3358941","10.1145\/3338469"],"URL":"https:\/\/doi.org\/10.1145\/3338469.3358941","relation":{},"subject":[],"published":{"date-parts":[[2019,11,11]]},"assertion":[{"value":"2019-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}