{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:42:04Z","timestamp":1771702924564,"version":"3.50.1"},"reference-count":52,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>In this article, we propose a new approach to the study of lattice problems used in cryptography. We specifically focus on module lattices of a fixed rank over some number field. An essential question is the hardness of certain computational problems on such module lattices, as the additional structure may allow exploitation. The fundamental insight is the fact that the collection of those lattices are quotients of algebraic manifolds by arithmetic subgroups. Functions in these spaces are studied in mathematics as part of the number theory. In particular, those form a module over the Hecke algebra associated with the general linear group. We use results on these function spaces to define a class of distributions on the space of lattices. Using the Hecke algebra, we define Hecke operators associated with collections of prime ideals of the number field and show a criterion on distributions to converge to the uniform distribution, if the Hecke operators are applied to the chosen distribution. Our approach is motivated by the work of de Boer, Ducas, Pellet-Mary, and Wesolowski (CRYPTO\u201920) on self-reduction of ideal lattices via Arakelov divisors.<\/jats:p>","DOI":"10.1515\/jmc-2021-0045","type":"journal-article","created":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T06:05:02Z","timestamp":1656655502000},"page":"156-197","source":"Crossref","is-referenced-by-count":1,"title":["Application of automorphic forms to lattice problems"],"prefix":"10.1515","volume":"16","author":[{"given":"Samed","family":"D\u00fczl\u00fc","sequence":"first","affiliation":[{"name":"Universit\u00e4t Regensburg , Regensburg , Germany"}]},{"given":"Juliane","family":"Kr\u00e4mer","sequence":"additional","affiliation":[{"name":"Universit\u00e4t Regensburg , Regensburg , Germany"}]}],"member":"374","published-online":{"date-parts":[[2022,7,1]]},"reference":[{"key":"2025120600292513170_j_jmc-2021-0045_ref_001","doi-asserted-by":"crossref","unstructured":"Micciancio D. The shortest vector problem is NP-hard to approximate to within some constant. SIAM J Comput. 2001 Mar;30(6):2008\u201335. Preliminary version in FOCS 1998.","DOI":"10.1137\/S0097539700373039"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_002","unstructured":"Micciancio D, Goldwasser S. Complexity of lattice problems. vol. 671 of The Kluwer International Series in Engineering and Computer Science. Boston, MA: Kluwer Academic Publishers; 2002. A cryptographic perspective. 10.1007\/978-1-4615-0897-7."},{"key":"2025120600292513170_j_jmc-2021-0045_ref_003","doi-asserted-by":"crossref","unstructured":"Bos J, Ducas L, Kiltz E, Lepoint T, Lyubashevsky V, Schanck JM, et al. CRYSTALS - Kyber: A CCA-Secure module-lattice-based KEM. In: 2018 IEEE European Symposium on Security and Privacy (EuroS P). 2018. p. 353\u201367.","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_004","doi-asserted-by":"crossref","unstructured":"Ducas L, Kiltz E, Lepoint T, Lyubashevsky V, Schwabe P, Seiler G, et al. CRYSTALS-Dilithium: A lattice-based digital signature scheme. IACR TCHES. 2018;2018(1):238\u201368. https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/839.","DOI":"10.46586\/tches.v2018.i1.238-268"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_005","unstructured":"Prest T, Fouque PA, Hoffstein J, Kirchner P, Lyubashevsky V, Pornin T, et al. FALCON. National Institute of Standards and Technology; 2020. Available at https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-3-submissions."},{"key":"2025120600292513170_j_jmc-2021-0045_ref_006","unstructured":"Alkim E, Ducas L, P\u00f6ppelmann T, Schwabe P. Post-quantum key exchange \u2013 a new hope. In: USENIX Security 2016. USENIX Association; 2016. p. 327\u201343."},{"key":"2025120600292513170_j_jmc-2021-0045_ref_007","doi-asserted-by":"crossref","unstructured":"Alkim E, Barreto PSLM, Bindel N, Kr\u00e4mer J, Longa P, Ricardini JE. The lattice-based digital signature scheme qTESLA. In: ACNS 20, Part I. vol. 12146. Heidelberg: Springer; 2020. p. 441\u201360.","DOI":"10.1007\/978-3-030-57808-4_22"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_008","unstructured":"Naehrig M, Alkim E, Bos J, Ducas L, Easterbrook K, LaMacchia B, et al. FrodoKEM. National Institute of Standards and Technology; 2020. Available at: https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-3-submissions."},{"key":"2025120600292513170_j_jmc-2021-0045_ref_009","doi-asserted-by":"crossref","unstructured":"Lyubashevsky V, Peikert C, Regev O. On ideal lattices and learning with errors over rings. In: Advances in cryptology\u2013EUROCRYPT 2010. vol. 6110 of Lecture Notes in Computer Science. Berlin: Springer; 2010. p. 1\u201323. 10.1007\/978-3-642-13190-5_1.","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_010","doi-asserted-by":"crossref","unstructured":"Lyubashevsky V, Peikert C, Regev O. A toolkit for ring-LWE cryptography. In: Advances in cryptology\u2013EUROCRYPT 2013. vol. 7881 of Lecture Notes in Computer Science. Heidelberg: Springer; 2013. p. 35\u201354. 10.1007\/978-3-642-38348-9_3.","DOI":"10.1007\/978-3-642-38348-9_3"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_011","doi-asserted-by":"crossref","unstructured":"Stehl\u00e9 D, Steinfeld R. Making NTRU as secure as worst-case problems over ideal lattices. In: Advances in cryptology\u2013EUROCRYPT 2011. vol. 6632 of Lecture Notes in Computer Science. Heidelberg: Springer; 2011. p. 27\u201347. 10.1007\/978-3-642-20465-4_4.","DOI":"10.1007\/978-3-642-20465-4_4"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_012","doi-asserted-by":"crossref","unstructured":"Peikert C. A decade of lattice cryptography. Found Trends Theor Comput Sci. 2014;10(4):i\u2013iii, 283\u2013424. 10.1561\/0400000074.","DOI":"10.1561\/0400000074"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_013","doi-asserted-by":"crossref","unstructured":"Cramer R, Ducas L, Wesolowski B. Short Stickelberger class relations and application to ideal-SVP. In: Advances in cryptology\u2013EUROCRYPT 2017. Part I. vol. 10210 of Lecture Notes in Computer Science. Cham: Springer; 2017. p. 324\u201348. 10.1007\/978-3-319-56620-7_12.","DOI":"10.1007\/978-3-319-56620-7_12"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_014","doi-asserted-by":"crossref","unstructured":"Ducas L, Plan\u00e7on M, Wesolowski B. On the shortness of vectors to be found by the ideal-SVP quantum algorithm. In: Advances in cryptology\u2013CRYPTO 2019. Part I. vol. 11692 of Lecture Notes in Computer Science. Cham: Springer; 2019. p. 322\u201351. 10.1007\/978-3-030-26948-7_12.","DOI":"10.1007\/978-3-030-26948-7_12"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_015","doi-asserted-by":"crossref","unstructured":"Pellet-Mary A, Hanrot G, Stehl\u00e9 D. Approx-SVP in ideal lattices with pre-processing. In: Advances in Cryptology\u2013EUROCRYPT 2019. Part II. vol. 11477 of Lecture Notes in Computer Science. Cham: Springer; 2019. p. 685\u2013716. 10.1007\/978-3-030-17656-3_2.","DOI":"10.1007\/978-3-030-17656-3_24"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_016","doi-asserted-by":"crossref","unstructured":"Langlois A, Stehl\u00e9 D. Worst-case to average-case reductions for module lattices. Des Codes Cryptogr. 2015;75(3):565\u201399. 10.1007\/s10623-014-9938-4.","DOI":"10.1007\/s10623-014-9938-4"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_017","doi-asserted-by":"crossref","unstructured":"de Boer K, Ducas L, Pellet-Mary A, Wesolowski B. Random self-reducibility of ideal-SVP via Arakelov random walks. In: Advances in Cryptology\u2013CRYPTO 2020. Part II. vol. 12171 of Lecture Notes in Computer Science. Cham: Springer; 2020. p. 243\u201373. 10.1007\/978-3-030-56880-1_9.","DOI":"10.1007\/978-3-030-56880-1_9"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_018","doi-asserted-by":"crossref","unstructured":"Kudla SS. From modular forms to automorphic representations. In: An introduction to the Langlands program (Jerusalem, 2001). Boston, Boston, MA: Birkh\u00e4user; 2003. p. 133\u201351.","DOI":"10.1007\/978-0-8176-8226-2_7"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_019","unstructured":"Grover C, Ling C, Vehkalahti R. Non-commutative ring learning with errors from cyclic algebras. 2019. https:\/\/ia.cr\/2019\/680. Cryptology ePrint Archive, Report 2019\/680."},{"key":"2025120600292513170_j_jmc-2021-0045_ref_020","doi-asserted-by":"crossref","unstructured":"Brakerski Z, Gentry C, Vaikuntanathan V. (Leveled) fully homomorphic encryption without bootstrapping. In: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference. New York: ACM; 2012. p. 309\u201325.","DOI":"10.1145\/2090236.2090262"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_021","doi-asserted-by":"crossref","unstructured":"Lee C, Pellet-Mary A, Stehl\u00e9 D, Wallet A. An LLL algorithm for module lattices. In: Advances in Cryptology \u2013 ASIACRYPT 2019. Cham: Springer International Publishing; 2019. p. 59\u201390.","DOI":"10.1007\/978-3-030-34621-8_3"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_022","doi-asserted-by":"crossref","unstructured":"Mukherjee T, Stephens-Davidowitz N. Lattice reduction for modules, or how to reduce moduleSVP to module SVP. In: Advances in Cryptology\u2013CRYPTO 2020. Part II. vol. 12171 of Lecture Notes in Computer Science. Cham: Springer; 2020. p. 213\u201342. 10.1007\/978-3-030-56880-1_8.","DOI":"10.1007\/978-3-030-56880-1_8"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_023","doi-asserted-by":"crossref","unstructured":"Lenstra AK, Lenstra Jr HW, Lov\u00e1sz L. Factoring polynomials with rational coefficients. Math Ann. 1982;261(4):515\u201334. 10.1007\/BF01457454.","DOI":"10.1007\/BF01457454"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_024","doi-asserted-by":"crossref","unstructured":"Neukirch J. Algebraic number theory. vol. 322 of Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences]. Berlin: Springer-Verlag; 1999. Translated from the 1992 German original and with a note by Norbert Schappacher, With a foreword by G. Harder. 10.1007\/978-3-662-03983-0.","DOI":"10.1007\/978-3-662-03983-0"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_025","doi-asserted-by":"crossref","unstructured":"Weil A. Basic number theory. Classics in mathematics. Berlin: Springer-Verlag; 1995. Reprint of the second (1973) edition.","DOI":"10.1007\/978-3-662-05978-4"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_026","unstructured":"Tate JT. Fourier analysis in number fields, and Hecke\u2019s zeta-functions. In: Algebraic Number Theory (Proceedings on Instructional Conference, Brighton, 1965). Washington, D.C.: Thompson; 1967. p. 305\u201347."},{"key":"2025120600292513170_j_jmc-2021-0045_ref_027","doi-asserted-by":"crossref","unstructured":"Ramakrishnan D, Valenza RJ. Fourier analysis on number fields. vol. 186 of Graduate texts in mathematics. New York: Springer-Verlag; 1999. 10.1007\/978-1-4757-3085-2.","DOI":"10.1007\/978-1-4757-3085-2"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_028","doi-asserted-by":"crossref","unstructured":"Borel A. Some finiteness properties of adele groups over number fields. Inst Hautes \u00c9tudes Sci Publ Math. 1963;16:5\u201330. http:\/\/www.numdam.org\/item?id=PMIHES_1963__16__5_0.","DOI":"10.1007\/BF02684289"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_029","unstructured":"Milne JS. Introduction to Shimura varieties. In: Harmonic analysis, the trace formula, and Shimura varieties. vol. 4 of Clay Mathematics. Proceedings of the American Mathematical Society. Providence, RI; 2005. p. 265\u2013378."},{"key":"2025120600292513170_j_jmc-2021-0045_ref_030","doi-asserted-by":"crossref","unstructured":"Garrett P. Modern analysis of automorphic forms by example. Vol. 1. vol. 173 of Cambridge Studies in Advanced Mathematics. Cambridge: Cambridge University Press; 2018.","DOI":"10.1017\/9781108571814"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_031","doi-asserted-by":"crossref","unstructured":"Rosenberg J. Algebraic K-theory and its applications. vol. 147 of Graduate texts in mathematics. New York: Springer-Verlag; 1994. 10.1007\/978-1-4612-4314-4.","DOI":"10.1007\/978-1-4612-4314-4"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_032","doi-asserted-by":"crossref","unstructured":"Cohen H. Advanced topics in computational number theory. vol. 193 of Graduate texts in mathematics. New York: Springer-Verlag; 2000. 10.1007\/978-1-4419-8489-0.","DOI":"10.1007\/978-1-4419-8489-0"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_033","doi-asserted-by":"crossref","unstructured":"Biasse JF, Song F. Efficient quantum algorithms for computing class groups and solving the principal ideal problem in arbitrary degree number fields. In: Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms. New York: ACM; 2016. p. 893\u2013902. 10.1137\/1.9781611974331.ch64.","DOI":"10.1137\/1.9781611974331.ch64"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_034","unstructured":"Cogdell JW, Kim HH, Murty MR. Lectures on automorphic L-functions. vol. 20 of Fields Institute Monographs. Providence, RI: American Mathematical Society; 2004."},{"key":"2025120600292513170_j_jmc-2021-0045_ref_035","doi-asserted-by":"crossref","unstructured":"Bump D. Automorphic forms and representations. vol. 55 of Cambridge studies in advanced mathematics. Cambridge: Cambridge University Press; 1997. 10.1017\/CBO9780511609572.","DOI":"10.1017\/CBO9780511609572"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_036","doi-asserted-by":"crossref","unstructured":"Bushnell CJ, Henniart G. The local Langlands conjecture for GL(2). vol. 335 of Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences]. Berlin: Springer-Verlag; 2006. 10.1007\/3-540-31511-X.","DOI":"10.1007\/3-540-31511-X"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_037","doi-asserted-by":"crossref","unstructured":"Borel A, Jacquet H. Automorphic forms and automorphic representations. In: Automorphic Forms, Representations and L-functions (Proceedings of Symposia in Pure Mathematics, Oregon State University, Corvallis, Ore., 1977), Part 1. Proceedings of Symposia in Pure Mathematics, XXXIII. Providence, R.I.: American Mathematical Society; 1979. p. 189\u2013207. With a supplement \u201cOn the notion of an automorphic representation\u201d by R. P. Langlands.","DOI":"10.1090\/pspum\/033.1\/546598"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_038","unstructured":"Knapp AW. Lie groups beyond an introduction. In: vol. 140 of Progress in Mathematics. 2nd ed. Boston, MA: Birkh\u00e4user Boston, Inc.; 2002."},{"key":"2025120600292513170_j_jmc-2021-0045_ref_039","doi-asserted-by":"crossref","unstructured":"Jacquet H, Langlands RP. Automorphic forms on GL(2). Lecture Notes in Mathematics. Vol. 114. Berlin-New York: Springer-Verlag; 1970.","DOI":"10.1007\/BFb0058988"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_040","unstructured":"Gelbart SS. Automorphic forms on ad\u00e8le groups. Princeton, N.J.: Princeton University Press; Tokyo: University of Tokyo Press; 1975. Annals of Mathematics Studies, No. 83."},{"key":"2025120600292513170_j_jmc-2021-0045_ref_041","doi-asserted-by":"crossref","unstructured":"Flath D. Decomposition of representations into tensor products. In: Automorphic Forms, Representations and L-functions (Proceedings of the Symposia in Pure Mathematics, Oregon State University, Corvallis, Ore., 1977), Part 1. Proceedings of the Symposia in Pure Mathematics, XXXIII. Providence, R.I.: American Mathematical Society; 1979. p. 179\u201383.","DOI":"10.1090\/pspum\/033.1\/546596"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_042","unstructured":"Gel\u2019fand IM, Graev MI, Pyatetskii-Shapiro II. Representation theory and automorphic functions. vol. 6 of Generalized Functions. Boston, MA: Academic Press, Inc.; 1990. Translated from the Russian by K. A. Hirsch, Reprint of the 1969 edition."},{"key":"2025120600292513170_j_jmc-2021-0045_ref_043","doi-asserted-by":"crossref","unstructured":"Casselman W. On some results of Atkin and Lehner. Math Ann. 1973;201:301\u201314. 10.1007\/BF01428197.","DOI":"10.1007\/BF01428197"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_044","doi-asserted-by":"crossref","unstructured":"Waterhouse WC. Introduction to affine group schemes. vol. 66 of Graduate Texts in Mathematics. New York-Berlin: Springer-Verlag; 1979.","DOI":"10.1007\/978-1-4612-6217-6"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_045","doi-asserted-by":"crossref","unstructured":"Humphreys JE. Linear algebraic groups. Graduate texts in mathematics, No. 21. New York-Heidelberg: Springer-Verlag; 1975.","DOI":"10.1007\/978-1-4684-9443-3"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_046","doi-asserted-by":"crossref","unstructured":"Gama N, Howgrave-Graham N, Nguyen PQ. Symplectic lattice reduction and NTRU. In: Advances in cryptology\u2013EUROCRYPT 2006. vol. 4004 of Lecture Notes in Computer Science. Berlin: Springer; 2006. p. 233\u201353. 10.1007\/11761679_15.","DOI":"10.1007\/11761679_15"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_047","unstructured":"Kirchner P, Espitau T, Fouque PA. Algebraic and Euclidean lattices: optimal lattice reduction and beyond; 2019. https:\/\/ia.cr\/2019\/1436. Cryptology ePrint Archive, Report 2019\/1436."},{"key":"2025120600292513170_j_jmc-2021-0045_ref_048","doi-asserted-by":"crossref","unstructured":"Berg\u00e9 AM. Symplectic lattices. In: Quadratic forms and their applications (Dublin, 1999). vol. 272 of Contemproray Mathematics. Providence, RI: American Mathematical Society; 2000. p. 9\u201322. 10.1090\/conm\/272\/04393.","DOI":"10.1090\/conm\/272\/04393"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_049","unstructured":"Milne JS. Class field theory (v4.03); 2020. Available at www.jmilne.org\/math\/."},{"key":"2025120600292513170_j_jmc-2021-0045_ref_050","doi-asserted-by":"crossref","unstructured":"Voight J. Quaternion algebras. vol. 288 of Graduate texts in mathematics. Cham: Springer; 2021. 10.1007\/978-3-030-56694-4.","DOI":"10.1007\/978-3-030-56694-4"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_051","doi-asserted-by":"crossref","unstructured":"Regev O. On lattices, learning with errors, random linear codes, and cryptography. In: STOC\u201905: Proceedings of the 37th Annual ACM Symposium on Theory of Computing. New York: ACM; 2005. p. 84\u201393. 10.1145\/1060590.1060603.","DOI":"10.1145\/1060590.1060603"},{"key":"2025120600292513170_j_jmc-2021-0045_ref_052","doi-asserted-by":"crossref","unstructured":"Serre JP. Local fields. vol. 67 of Graduate texts in mathematics. New York-Berlin: Springer-Verlag; 1979. TranslatedFrench by Marvin Jay Greenberg.","DOI":"10.1007\/978-1-4757-5673-9"}],"container-title":["Journal of Mathematical Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jmc-2021-0045\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jmc-2021-0045\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T00:30:12Z","timestamp":1764981012000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jmc-2021-0045\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":52,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,2,10]]},"published-print":{"date-parts":[[2022,2,10]]}},"alternative-id":["10.1515\/jmc-2021-0045"],"URL":"https:\/\/doi.org\/10.1515\/jmc-2021-0045","relation":{},"ISSN":["1862-2984"],"issn-type":[{"value":"1862-2984","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,1]]}}}