{"id":"https://openalex.org/W2794472443","doi":"https://doi.org/10.1007/978-3-319-89339-6_12","title":"HILA5 Pindakaas: On the CCA Security of Lattice-Based Encryption with Error Correction","display_name":"HILA5 Pindakaas: On the CCA Security of Lattice-Based Encryption with Error Correction","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2794472443","doi":"https://doi.org/10.1007/978-3-319-89339-6_12","mag":"2794472443"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-89339-6_12","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-89339-6_12","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research.tue.nl/en/publications/e79aedbc-f736-4dc3-ac22-29f0ef13561d","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108114375","display_name":"Daniel J. Bernstein","orcid":null},"institutions":[{"id":"https://openalex.org/I39422238","display_name":"University of Illinois Chicago","ror":"https://ror.org/02mpq6x41","country_code":"US","type":"education","lineage":["https://openalex.org/I39422238"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Daniel J. Bernstein","raw_affiliation_strings":["Department of Computer Science, University of Illinois at Chicago, Chicago, IL, 60607-7045, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Illinois at Chicago, Chicago, IL, 60607-7045, USA","institution_ids":["https://openalex.org/I39422238"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023518191","display_name":"Leon Groot Bruinderink","orcid":null},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Leon Groot Bruinderink","raw_affiliation_strings":["Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016164029","display_name":"Tanja Lange","orcid":null},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Tanja Lange","raw_affiliation_strings":["Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031311808","display_name":"Lorenz Panny","orcid":null},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Lorenz Panny","raw_affiliation_strings":["Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5023518191","https://openalex.org/A5108114375"],"corresponding_institution_ids":["https://openalex.org/I39422238","https://openalex.org/I83019370"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":4.0726,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.95564942,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"203","last_page":"216"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.81385338306427},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.6501291394233704},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.6334224343299866},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6114354133605957},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6090133190155029},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5426446199417114},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4728955030441284},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3604316711425781},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.22597026824951172},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.056836992502212524}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.81385338306427},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.6501291394233704},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.6334224343299866},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6114354133605957},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6090133190155029},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5426446199417114},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4728955030441284},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3604316711425781},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.22597026824951172},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.056836992502212524}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/978-3-319-89339-6_12","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-89339-6_12","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:pure.tue.nl:openaire_cris_publications/e79aedbc-f736-4dc3-ac22-29f0ef13561d","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/e79aedbc-f736-4dc3-ac22-29f0ef13561d","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Bernstein, D J, Groot Bruinderink, L, Lange, T & Panny, L 2018, HILA5 pindakaas : on the CCA security of lattice-based encryption with error correction. in A Joux, A Nitaj & T Rachidi (eds), Progress in Cryptology - AFRICACRYPT 2018 : 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7\u20139, 2018, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10831 LNCS, Springer, Dordrecht, pp. 203-216, 10th International Conference on the Theory and Application of Cryptographic Techniques in Africa (Africacrypt 2018), Marrakesh, Morocco, 7/05/18. https://doi.org/10.1007/978-3-319-89339-6_12","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:tue:oai:pure.tue.nl:publications/e79aedbc-f736-4dc3-ac22-29f0ef13561d","is_oa":true,"landing_page_url":"https://research.tue.nl/nl/publications/e79aedbc-f736-4dc3-ac22-29f0ef13561d","pdf_url":"https://research.tue.nl/nl/publications/e79aedbc-f736-4dc3-ac22-29f0ef13561d","source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Progress in Cryptology - AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7\u20139, 2018, Proceedings, 203 - 216","raw_type":"info:eu-repo/semantics/conferencepaper"},{"id":"pmh:oai:pure.tue.nl:publications/e79aedbc-f736-4dc3-ac22-29f0ef13561d","is_oa":true,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85045940909&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Bernstein, D J, Groot Bruinderink, L, Lange, T & Panny, L 2018, HILA5 pindakaas : on the CCA security of lattice-based encryption with error correction. in A Joux, A Nitaj & T Rachidi (eds), Progress in Cryptology - AFRICACRYPT 2018 : 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7\u20139, 2018, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10831 LNCS, Springer, Dordrecht, pp. 203-216, 10th International Conference on the Theory and Application of Cryptographic Techniques in Africa (Africacrypt 2018), Marrakesh, Morocco, 7/05/18. https://doi.org/10.1007/978-3-319-89339-6_12","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:pure.tue.nl:openaire_cris_publications/e79aedbc-f736-4dc3-ac22-29f0ef13561d","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/e79aedbc-f736-4dc3-ac22-29f0ef13561d","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Bernstein, D J, Groot Bruinderink, L, Lange, T & Panny, L 2018, HILA5 pindakaas : on the CCA security of lattice-based encryption with error correction. in A Joux, A Nitaj & T Rachidi (eds), Progress in Cryptology - AFRICACRYPT 2018 : 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7\u20139, 2018, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10831 LNCS, Springer, Dordrecht, pp. 203-216, 10th International Conference on the Theory and Application of Cryptographic Techniques in Africa (Africacrypt 2018), Marrakesh, Morocco, 7/05/18. https://doi.org/10.1007/978-3-319-89339-6_12","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7099999785423279,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G7551690970","display_name":null,"funder_award_id":"1314919","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W151792660","https://openalex.org/W1578742426","https://openalex.org/W1607264302","https://openalex.org/W1611563112","https://openalex.org/W1675339804","https://openalex.org/W1896743460","https://openalex.org/W2077244027","https://openalex.org/W2491909939","https://openalex.org/W2494078997","https://openalex.org/W2739993935","https://openalex.org/W2781263269"],"related_works":["https://openalex.org/W4296458422","https://openalex.org/W2229809156","https://openalex.org/W1611563112","https://openalex.org/W2128230520","https://openalex.org/W2535304355","https://openalex.org/W3009555975","https://openalex.org/W1486932457","https://openalex.org/W1492902541","https://openalex.org/W3205208619","https://openalex.org/W2404632789"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
