{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:21:10Z","timestamp":1729664470110,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.23919\/isita.2018.8664308","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T23:49:11Z","timestamp":1552348151000},"page":"306-310","source":"Crossref","is-referenced-by-count":1,"title":["An Experimental Analysis on Lattice Attacks against Ring-LWE over Decomposition Fields"],"prefix":"10.23919","author":[{"given":"Shota","family":"Terada","sequence":"first","affiliation":[]},{"given":"Hideto","family":"Nakano","sequence":"additional","affiliation":[]},{"given":"Shinya","family":"Okumura","sequence":"additional","affiliation":[]},{"given":"Atsuko","family":"Miyaji","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_3"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"554","DOI":"10.1007\/978-3-662-44371-2_31","article-title":"Algorithms in HElib","volume":"8616","author":"halevi","year":"2014","journal-title":"Proc of CRYPTO 2014 LNCS"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1287\/moor.12.3.415"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/BF01457454"},{"key":"ref14","first-page":"318","article-title":"A Comparison of the Homomorphic Encryption Schemes FV and YASHE","volume":"8469","author":"lepoint","year":"2014","journal-title":"Proc of AFRICACRYPT 2008 LNCS"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-13190-5_1","article-title":"On Ideal Lattices and Learning with Errors over Rings","volume":"6110","author":"lyubashevsky","year":"2010","journal-title":"Eurocrypt 2010 LNCS"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2535925"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/978-3-642-38348-9_3","article-title":"A Toolkit for Ring-LWE Cryptography","volume":"7881","author":"lyubashevsky","year":"2013","journal-title":"EUROCRYPT 2013 LNCS"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/BF01581144"},{"key":"ref19","article-title":"An Experimental Study of Kannan&#x2019;s Embedding Technique for the Search LWE Problem","author":"wang","year":"2017","journal-title":"ICICS 2017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71667-1_2"},{"key":"ref6","first-page":"443","article-title":"Security considerations for Galois non-dual RLWE families","volume":"10532","author":"chen","year":"2016","journal-title":"Proc of SAC 2016 LNCS"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1007\/978-3-642-22792-9_29","article-title":"Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages","volume":"6841","author":"brakerski","year":"2011","journal-title":"CRYPTO 2011 LNCS"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900030"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-25385-0_1","article-title":"BKZ 2.0: Better Lattice Security Estimates","volume":"7073","author":"chen","year":"2011","journal-title":"Asiacrypt 2011 LNCS"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/BF02579403"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78556-1_7"},{"key":"ref9","article-title":"Somewhat Practical Fully Homomorphic Encryption","author":"fan","year":"2012","journal-title":"Cryptology ePrint Archive Report 2012\/144"}],"event":{"name":"2018 International Symposium on Information Theory and Its Applications (ISITA)","start":{"date-parts":[[2018,10,28]]},"location":"Singapore","end":{"date-parts":[[2018,10,31]]}},"container-title":["2018 International Symposium on Information Theory and Its Applications (ISITA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8660385\/8664205\/08664308.pdf?arnumber=8664308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,13]],"date-time":"2022-09-13T17:34:55Z","timestamp":1663090495000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8664308\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":19,"URL":"https:\/\/doi.org\/10.23919\/isita.2018.8664308","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}