{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T17:45:27Z","timestamp":1775756727826,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["19F19378"],"award-info":[{"award-number":["19F19378"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3384940.3388958","type":"proceedings-article","created":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T01:51:28Z","timestamp":1602121888000},"page":"28-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Cryptanalysis of GiophantusTM Schemes against Hybrid Attack"],"prefix":"10.1145","author":[{"given":"Yuntao","family":"Wang","sequence":"first","affiliation":[{"name":"The University of Tokyo &amp; Japan Society for the Promotion of Science, Tokyo, Japan"}]},{"given":"Yasuhiko","family":"Ikematsu","sequence":"additional","affiliation":[{"name":"Kyushu University, Fukuoka, Japan"}]},{"given":"Koichiro","family":"Akiyama","sequence":"additional","affiliation":[{"name":"Toshiba Corporation R&amp;D Center, Kanagawa, Japan"}]},{"given":"Tsuyoshi","family":"Takagi","sequence":"additional","affiliation":[{"name":"The University of Tokyo, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2020,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"National Institute of Standards and Technology. Post-Quantum Cryptography","author":"US Department of Commerce","year":"2019","unstructured":"US Department of Commerce , National Institute of Standards and Technology. Post-Quantum Cryptography , 2019 . https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/. US Department of Commerce, National Institute of Standards and Technology. Post-Quantum Cryptography, 2019. https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/380752.380857"},{"key":"e_1_3_2_1_3_1","first-page":"215","volume-title":"Revised Selected Papers","author":"Akiyama K.","year":"2017","unstructured":"K. Akiyama , Y. Goto , S. Okumura , T. Takagi , K. Nuida , and G. Hanaoka . A public-key encryption scheme based on non-linear indeterminate equations. In Selected Areas in Cryptography - SAC 2017 - 24th International Conference , Revised Selected Papers , pages 215 -- 234 , 2017 . K. Akiyama, Y. Goto, S. Okumura, T. Takagi, K. Nuida, and G. Hanaoka. A public-key encryption scheme based on non-linear indeterminate equations. In Selected Areas in Cryptography - SAC 2017 - 24th International Conference, Revised Selected Papers, pages 215--234, 2017."},{"key":"e_1_3_2_1_4_1","volume-title":"SCIS 2020","author":"Akiyama K.","year":"2020","unstructured":"K. Akiyama , Y. Wang , Y. Ikematsu , and T. Takagi . A study on a variant of indeterminate equation public-key cryptosystems assuming one-wayness . In SCIS 2020 , 2020 . K. Akiyama, Y. Wang, Y. Ikematsu, and T. Takagi. A study on a variant of indeterminate equation public-key cryptosystems assuming one-wayness. In SCIS 2020, 2020."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2015-0016"},{"key":"e_1_3_2_1_6_1","first-page":"327","volume-title":"USENIX Security Symposium","author":"Alkim E.","year":"2016","unstructured":"E. Alkim , L. Ducas , T. P\u00f6ppelmann , and P. Schwabe . Post-quantum key exchange-a new hope . In USENIX Security Symposium , pages 327 -- 343 , 2016 . E. Alkim, L. Ducas, T. P\u00f6ppelmann, and P. Schwabe. Post-quantum key exchange-a new hope. In USENIX Security Symposium, pages 327--343, 2016."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/646502.696106"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"J. A. Buchmann F. G\u00f6 pfert R. Player and T. Wunderer. On the hardness of LWE with binary error: Revisiting the hybrid lattice-reduction and meet-in-the-middle attack. In Progress in Cryptology - AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa Proceedings pages 24--43 2016.  J. A. Buchmann F. G\u00f6 pfert R. Player and T. Wunderer. On the hardness of LWE with binary error: Revisiting the hybrid lattice-reduction and meet-in-the-middle attack. In Progress in Cryptology - AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa Proceedings pages 24--43 2016.","DOI":"10.1007\/978-3-319-31517-1_2"},{"key":"e_1_3_2_1_9_1","volume-title":"Lattice reduction and concrete security of fully homomorphic encryption. Dept. Informatique","author":"Chen Y.","year":"2013","unstructured":"Y. Chen . Lattice reduction and concrete security of fully homomorphic encryption. Dept. Informatique , ENS, Paris, France , PhD thesis, 2013 . Y. Chen. Lattice reduction and concrete security of fully homomorphic encryption. Dept. Informatique, ENS, Paris, France, PhD thesis, 2013."},{"key":"e_1_3_2_1_10_1","first-page":"31","volume-title":"27th Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Gama N.","year":"2008","unstructured":"N. Gama and P. Q. Nguyen . Predicting lattice reduction. In Advances in Cryptology - EUROCRYPT 2008 , 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques , Proceedings , pages 31 -- 51 , 2008 . N. Gama and P. Q. Nguyen. Predicting lattice reduction. In Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, pages 31--51, 2008."},{"key":"e_1_3_2_1_11_1","first-page":"184","volume-title":"PQCrypto 2017","author":"F. G\u00f6","year":"2017","unstructured":"F. G\u00f6 pfert, C. van Vredendaal , and T. Wunderer . A hybrid lattice basis reduction and quantum search attack on LWE. In Post-Quantum Cryptography - 8th International Workshop , PQCrypto 2017 , Proceedings , pages 184 -- 202 , 2017 . F. G\u00f6 pfert, C. van Vredendaal, and T. Wunderer. A hybrid lattice basis reduction and quantum search attack on LWE. In Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Proceedings, pages 184--202, 2017."},{"key":"e_1_3_2_1_12_1","first-page":"437","volume-title":"7th International Conference, ACNS 2009","author":"Hirschhorn P. S.","year":"2009","unstructured":"P. S. Hirschhorn , J. Hoffstein , N. Howgrave-Graham , and W. Whyte . Choosing ntruencrypt parameters in light of combined lattice reduction and MI\u2122 approaches. In Applied Cryptography and Network Security , 7th International Conference, ACNS 2009 , Proceedings , pages 437 -- 455 , 2009 . P. S. Hirschhorn, J. Hoffstein, N. Howgrave-Graham, and W. Whyte. Choosing ntruencrypt parameters in light of combined lattice reduction and MI\u2122 approaches. In Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Proceedings, pages 437--455, 2009."},{"key":"e_1_3_2_1_13_1","first-page":"267","volume-title":"Third International Symposium, ANTS-III","author":"Hoffstein J.","year":"1998","unstructured":"J. Hoffstein , J. Pipher , and J. H. Silverman . NTRU: A ring-based public key cryptosystem. In Algorithmic Number Theory , Third International Symposium, ANTS-III , Proceedings , pages 267 -- 288 , 1998 . J. Hoffstein, J. Pipher, and J. H. Silverman. NTRU: A ring-based public key cryptosystem. In Algorithmic Number Theory, Third International Symposium, ANTS-III, Proceedings, pages 267--288, 1998."},{"key":"e_1_3_2_1_14_1","first-page":"150","volume-title":"27th Annual International Cryptology Conference","author":"Howgrave-Graham N.","year":"2007","unstructured":"N. Howgrave-Graham . A hybrid lattice-reduction and meet-in-the-middle attack against NTRU. In Advances in Cryptology - CRYPTO 2007 , 27th Annual International Cryptology Conference , Proceedings , pages 150 -- 169 , 2007 . N. Howgrave-Graham. A hybrid lattice-reduction and meet-in-the-middle attack against NTRU. In Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Proceedings, pages 150--169, 2007."},{"key":"e_1_3_2_1_15_1","volume-title":"A meet-in-the-middle attack on an ntru private key","author":"Howgrave-Graham N.","year":"2003","unstructured":"N. Howgrave-Graham , J. Silverman , and W. Whyte . A meet-in-the-middle attack on an ntru private key . 2003 . Available at https:\/\/www.researchgate.net\/publication\/2906622. N. Howgrave-Graham, J. Silverman, and W. Whyte. A meet-in-the-middle attack on an ntru private key. 2003. Available at https:\/\/www.researchgate.net\/publication\/2906622."},{"key":"e_1_3_2_1_16_1","volume-title":"SCIS 2019","author":"Ikematsu Y.","year":"2019","unstructured":"Y. Ikematsu , Y. Wang , K. Akiyama , and T. Takagi . Experimental analysis for linear algebraic attack on a variant of indeterminate equation public-key cryptosystems . In SCIS 2019 , 2019 . Y. Ikematsu, Y. Wang, K. Akiyama, and T. Takagi. Experimental analysis for linear algebraic attack on a variant of indeterminate equation public-key cryptosystems. In SCIS 2019, 2019."},{"key":"e_1_3_2_1_17_1","first-page":"1","volume-title":"29th Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Lyubashevsky V.","year":"2010","unstructured":"V. Lyubashevsky , C. Peikert , and O. Regev . On ideal lattices and learning with errors over rings. In Advances in Cryptology - EUROCRYPT 2010 , 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques , Proceedings , pages 1 -- 23 , 2010 . V. Lyubashevsky, C. Peikert, and O. Regev. On ideal lattices and learning with errors over rings. In Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, pages 1--23, 2010."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36494-3_14"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01581144"},{"key":"e_1_3_2_1_21_1","first-page":"541","volume-title":"ICICS 2017","author":"Wang Y.","year":"2017","unstructured":"Y. Wang , Y. Aono , and T. Takagi . An experimental study of kannan's embedding technique for the search LWE problem. In Information and Communications Security - 19th International Conference , ICICS 2017 , Proceedings , pages 541 -- 553 , 2017 . Y. Wang, Y. Aono, and T. Takagi. An experimental study of kannan's embedding technique for the search LWE problem. In Information and Communications Security - 19th International Conference, ICICS 2017, Proceedings, pages 541--553, 2017."},{"key":"e_1_3_2_1_22_1","volume-title":"Improved analysis and refined security estimates. IACR Cryptology ePrint Archive","author":"Wunderer T.","year":"2016","unstructured":"T. Wunderer . Revisiting the hybrid attack : Improved analysis and refined security estimates. IACR Cryptology ePrint Archive , 2016 :733, 2016. T. Wunderer. Revisiting the hybrid attack: Improved analysis and refined security estimates. IACR Cryptology ePrint Archive, 2016:733, 2016."}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"ASIA CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3384940.3388958","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3384940.3388958","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:27Z","timestamp":1750199607000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3384940.3388958"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":22,"alternative-id":["10.1145\/3384940.3388958","10.1145\/3384940"],"URL":"https:\/\/doi.org\/10.1145\/3384940.3388958","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}