{"id":"https://openalex.org/W4399651868","doi":"https://doi.org/10.1007/s12095-024-00722-1","title":"Further improvements of the estimation of key enumeration with applications to solving LWE","display_name":"Further improvements of the estimation of key enumeration with applications to solving LWE","publication_year":2024,"publication_date":"2024-06-13","ids":{"openalex":"https://openalex.org/W4399651868","doi":"https://doi.org/10.1007/s12095-024-00722-1"},"language":"en","primary_location":{"id":"doi:10.1007/s12095-024-00722-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s12095-024-00722-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s12095-024-00722-1.pdf","source":{"id":"https://openalex.org/S129219326","display_name":"Cryptography and Communications","issn_l":"1936-2447","issn":["1936-2447","1936-2455"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography and Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s12095-024-00722-1.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003910934","display_name":"Alessandro Budroni","orcid":"https://orcid.org/0000-0002-3544-5128"},"institutions":[{"id":"https://openalex.org/I4210087059","display_name":"Technology Innovation Institute","ror":"https://ror.org/001kv2y39","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210087059"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Alessandro Budroni","raw_affiliation_strings":["Cryptography Research Center, Technology Innovation Institute, Abu Dhabi, UAE"],"raw_orcid":"https://orcid.org/0000-0002-3544-5128","affiliations":[{"raw_affiliation_string":"Cryptography Research Center, Technology Innovation Institute, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I4210087059"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061311545","display_name":"Erik M\u00e5rtensson","orcid":"https://orcid.org/0000-0001-5824-7282"},"institutions":[{"id":"https://openalex.org/I187531555","display_name":"Lund University","ror":"https://ror.org/012a77v79","country_code":"SE","type":"education","lineage":["https://openalex.org/I187531555"]},{"id":"https://openalex.org/I4432739","display_name":"University of Bergen","ror":"https://ror.org/03zga2b32","country_code":"NO","type":"education","lineage":["https://openalex.org/I4432739"]}],"countries":["NO","SE"],"is_corresponding":true,"raw_author_name":"Erik M\u00e5rtensson","raw_affiliation_strings":["Advenica AB, Malm\u00f6, Sweden","Department of Electrical and Information Technology, Lund University, Lund, Sweden","Selmer Center, Department of Informatics, University of Bergen, Bergen, Norway"],"raw_orcid":"https://orcid.org/0000-0001-5824-7282","affiliations":[{"raw_affiliation_string":"Advenica AB, Malm\u00f6, Sweden","institution_ids":[]},{"raw_affiliation_string":"Department of Electrical and Information Technology, Lund University, Lund, Sweden","institution_ids":["https://openalex.org/I187531555"]},{"raw_affiliation_string":"Selmer Center, Department of Informatics, University of Bergen, Bergen, Norway","institution_ids":["https://openalex.org/I4432739"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5061311545"],"corresponding_institution_ids":["https://openalex.org/I187531555","https://openalex.org/I4432739"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":{"value":2290,"currency":"EUR","value_usd":2890},"fwci":0.9934,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.79205328,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"16","issue":"5","first_page":"1163","last_page":"1182"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/enumeration","display_name":"Enumeration","score":0.9520690441131592},{"id":"https://openalex.org/keywords/learning-with-errors","display_name":"Learning with errors","score":0.6990618705749512},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.6482375860214233},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5978619456291199},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5491793155670166},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5256751179695129},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.524025022983551},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4915514886379242},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4191800355911255},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.4138127863407135},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.230491042137146},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.21065068244934082}],"concepts":[{"id":"https://openalex.org/C156340839","wikidata":"https://www.wikidata.org/wiki/Q2704791","display_name":"Enumeration","level":2,"score":0.9520690441131592},{"id":"https://openalex.org/C2779014939","wikidata":"https://www.wikidata.org/wiki/Q6510239","display_name":"Learning with errors","level":3,"score":0.6990618705749512},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6482375860214233},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5978619456291199},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5491793155670166},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5256751179695129},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.524025022983551},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4915514886379242},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4191800355911255},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.4138127863407135},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.230491042137146},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.21065068244934082},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s12095-024-00722-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s12095-024-00722-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s12095-024-00722-1.pdf","source":{"id":"https://openalex.org/S129219326","display_name":"Cryptography and Communications","issn_l":"1936-2447","issn":["1936-2447","1936-2455"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography and Communications","raw_type":"journal-article"},{"id":"pmh:oai:lup.lub.lu.se:b5831bdf-9f7f-475a-bd5c-c22a2bdd81aa","is_oa":false,"landing_page_url":"https://lup.lub.lu.se/record/b5831bdf-9f7f-475a-bd5c-c22a2bdd81aa","pdf_url":null,"source":{"id":"https://openalex.org/S4306400536","display_name":"Lund University Publications (Lund University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I187531555","host_organization_name":"Lund University","host_organization_lineage":["https://openalex.org/I187531555"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ISSN: 1936-2455","raw_type":"text"}],"best_oa_location":{"id":"doi:10.1007/s12095-024-00722-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s12095-024-00722-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s12095-024-00722-1.pdf","source":{"id":"https://openalex.org/S129219326","display_name":"Cryptography and Communications","issn_l":"1936-2447","issn":["1936-2447","1936-2455"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography and Communications","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4399651868.pdf"},"referenced_works_count":38,"referenced_works":["https://openalex.org/W80562455","https://openalex.org/W148211867","https://openalex.org/W1598269861","https://openalex.org/W1645247980","https://openalex.org/W1760474993","https://openalex.org/W1845765495","https://openalex.org/W1953288577","https://openalex.org/W1989510734","https://openalex.org/W1992938819","https://openalex.org/W2050689197","https://openalex.org/W2061949491","https://openalex.org/W2084652510","https://openalex.org/W2113333997","https://openalex.org/W2121981260","https://openalex.org/W2123097583","https://openalex.org/W2123314859","https://openalex.org/W2124407183","https://openalex.org/W2141040012","https://openalex.org/W2554750353","https://openalex.org/W2768735218","https://openalex.org/W2946582523","https://openalex.org/W2952033682","https://openalex.org/W2962941363","https://openalex.org/W3107222908","https://openalex.org/W3171272214","https://openalex.org/W3208533855","https://openalex.org/W3211790055","https://openalex.org/W3215125479","https://openalex.org/W4205104754","https://openalex.org/W4205235378","https://openalex.org/W4226027719","https://openalex.org/W4292454253","https://openalex.org/W4365936110","https://openalex.org/W4385654504","https://openalex.org/W4386066492","https://openalex.org/W4389011108","https://openalex.org/W4395688711","https://openalex.org/W4395688856"],"related_works":["https://openalex.org/W108845024","https://openalex.org/W2550942574","https://openalex.org/W3089223619","https://openalex.org/W4288849478","https://openalex.org/W2315723423","https://openalex.org/W2940752727","https://openalex.org/W4399217595","https://openalex.org/W2986555706","https://openalex.org/W1561797008","https://openalex.org/W2397608281"],"abstract_inverted_index":{"Abstract":[0],"In":[1,122],"post-quantum":[2],"cryptography,":[3],"Learning":[4],"With":[5],"Errors":[6],"(LWE)":[7],"is":[8,19,145],"one":[9,20],"of":[10,21,45,64,66,73,85,104,138,143,151,157],"the":[11,22,27,38,67,82,94,101,105,140],"dominant":[12],"underlying":[13],"mathematical":[14],"problems.":[15],"The":[16,41,54],"dual":[17,107],"attack":[18,42],"main":[23],"strategies":[24,128],"for":[25,80],"solving":[26],"LWE":[28],"problem,":[29],"and":[30,50,77,111,120],"it":[31,148],"has":[32],"recently":[33],"gathered":[34],"significant":[35],"attention":[36],"within":[37],"research":[39,163],"community.":[40],"strategy":[43],"consists":[44,72],"a":[46,51,61,75],"lattice":[47],"reduction":[48],"part":[49],"distinguishing":[52],"part.":[53],"latter":[55],"includes":[56],"an":[57,87],"enumeration":[58,88,127,144],"subroutine":[59],"over":[60],"certain":[62],"number":[63],"positions":[65],"secret":[68],"key.":[69],"Our":[70],"contribution":[71],"giving":[74],"precise":[76],"efficient":[78],"approach":[79],"calculating":[81,139],"expected":[83,141],"complexity":[84],"such":[86,116],"procedure,":[89],"which":[90],"was":[91],"missing":[92],"in":[93,154,161],"literature.":[95],"This":[96],"allows":[97],"us":[98],"to":[99,129],"decrease":[100],"estimated":[102],"cost":[103,142],"whole":[106],"attack,":[108],"both":[109],"classically":[110],"quantumly,":[112],"on":[113],"well-known":[114],"protocols":[115],"as":[117],"Kyber,":[118],"Saber,":[119],"TFHE.":[121],"addition,":[123],"we":[124],"explore":[125],"different":[126,162],"investigate":[130],"some":[131],"potential":[132],"further":[133],"improvements.":[134],"As":[135],"our":[136],"method":[137],"pretty":[146],"general,":[147],"might":[149],"be":[150],"independent":[152],"interest":[153],"other":[155],"areas":[156],"cryptanalysis":[158],"or":[159],"even":[160],"areas.":[164]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
