{"id":"https://openalex.org/W4386066492","doi":"https://doi.org/10.1109/isit54713.2023.10206474","title":"Improved Estimation of Key Enumeration with Applications to Solving LWE","display_name":"Improved Estimation of Key Enumeration with Applications to Solving LWE","publication_year":2023,"publication_date":"2023-06-25","ids":{"openalex":"https://openalex.org/W4386066492","doi":"https://doi.org/10.1109/isit54713.2023.10206474"},"language":"en","primary_location":{"id":"doi:10.1109/isit54713.2023.10206474","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit54713.2023.10206474","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003910934","display_name":"Alessandro Budroni","orcid":"https://orcid.org/0000-0002-3544-5128"},"institutions":[{"id":"https://openalex.org/I4210087059","display_name":"Technology Innovation Institute","ror":"https://ror.org/001kv2y39","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210087059"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Alessandro Budroni","raw_affiliation_strings":["Technology Innovation Institute,Cryptography Research Center,Abu Dhabi,UAE","Cryptography Research Center, Technology Innovation Institute, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"Technology Innovation Institute,Cryptography Research Center,Abu Dhabi,UAE","institution_ids":["https://openalex.org/I4210087059"]},{"raw_affiliation_string":"Cryptography Research Center, Technology Innovation Institute, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I4210087059"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061311545","display_name":"Erik M\u00e5rtensson","orcid":"https://orcid.org/0000-0001-5824-7282"},"institutions":[{"id":"https://openalex.org/I4432739","display_name":"University of Bergen","ror":"https://ror.org/03zga2b32","country_code":"NO","type":"education","lineage":["https://openalex.org/I4432739"]},{"id":"https://openalex.org/I187531555","display_name":"Lund University","ror":"https://ror.org/012a77v79","country_code":"SE","type":"education","lineage":["https://openalex.org/I187531555"]}],"countries":["NO","SE"],"is_corresponding":false,"raw_author_name":"Erik M\u00e5rtensson","raw_affiliation_strings":["University of Bergen,Selmer Center,Department of Informatics,Norway","Department of Informatics, Selmer Center, University of Bergen, Norway","Department of Electrical and Information Technology, Lund University, Sweden"],"affiliations":[{"raw_affiliation_string":"University of Bergen,Selmer Center,Department of Informatics,Norway","institution_ids":["https://openalex.org/I4432739"]},{"raw_affiliation_string":"Department of Informatics, Selmer Center, University of Bergen, Norway","institution_ids":["https://openalex.org/I4432739"]},{"raw_affiliation_string":"Department of Electrical and Information Technology, Lund University, Sweden","institution_ids":["https://openalex.org/I187531555"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5003910934"],"corresponding_institution_ids":["https://openalex.org/I4210087059"],"apc_list":null,"apc_paid":null,"fwci":0.5245,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.71294818,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"495","last_page":"500"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/learning-with-errors","display_name":"Learning with errors","score":0.7193450927734375},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7183929681777954},{"id":"https://openalex.org/keywords/enumeration","display_name":"Enumeration","score":0.7142622470855713},{"id":"https://openalex.org/keywords/post-quantum-cryptography","display_name":"Post-quantum cryptography","score":0.6984266638755798},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6297652721405029},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.5849073529243469},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.5380055904388428},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5093146562576294},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.48736363649368286},{"id":"https://openalex.org/keywords/standardization","display_name":"Standardization","score":0.47525903582572937},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.46385809779167175},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.42929524183273315},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.39978671073913574},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.3804183602333069},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.30694764852523804},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.28055477142333984},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.18543007969856262},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.16035321354866028},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1036108136177063}],"concepts":[{"id":"https://openalex.org/C2779014939","wikidata":"https://www.wikidata.org/wiki/Q6510239","display_name":"Learning with errors","level":3,"score":0.7193450927734375},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7183929681777954},{"id":"https://openalex.org/C156340839","wikidata":"https://www.wikidata.org/wiki/Q2704791","display_name":"Enumeration","level":2,"score":0.7142622470855713},{"id":"https://openalex.org/C108277079","wikidata":"https://www.wikidata.org/wiki/Q7233576","display_name":"Post-quantum cryptography","level":4,"score":0.6984266638755798},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6297652721405029},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.5849073529243469},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.5380055904388428},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5093146562576294},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.48736363649368286},{"id":"https://openalex.org/C188087704","wikidata":"https://www.wikidata.org/wiki/Q369577","display_name":"Standardization","level":2,"score":0.47525903582572937},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.46385809779167175},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.42929524183273315},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.39978671073913574},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.3804183602333069},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.30694764852523804},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.28055477142333984},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.18543007969856262},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.16035321354866028},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1036108136177063},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/isit54713.2023.10206474","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit54713.2023.10206474","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},{"id":"pmh:oai:lup.lub.lu.se:f59c58cb-b76c-47ae-ae24-9b764e314f58","is_oa":false,"landing_page_url":"https://lup.lub.lu.se/record/f59c58cb-b76c-47ae-ae24-9b764e314f58","pdf_url":null,"source":{"id":"https://openalex.org/S4306400536","display_name":"Lund University Publications (Lund University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I187531555","host_organization_name":"Lund University","host_organization_lineage":["https://openalex.org/I187531555"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W80562455","https://openalex.org/W148211867","https://openalex.org/W1598269861","https://openalex.org/W1645247980","https://openalex.org/W1760474993","https://openalex.org/W1953288577","https://openalex.org/W1989510734","https://openalex.org/W1992938819","https://openalex.org/W2050689197","https://openalex.org/W2061949491","https://openalex.org/W2084652510","https://openalex.org/W2113333997","https://openalex.org/W2121981260","https://openalex.org/W2123097583","https://openalex.org/W2123314859","https://openalex.org/W2124407183","https://openalex.org/W2141040012","https://openalex.org/W2396533455","https://openalex.org/W2494078997","https://openalex.org/W2554750353","https://openalex.org/W2946582523","https://openalex.org/W2952033682","https://openalex.org/W2962941363","https://openalex.org/W3107222908","https://openalex.org/W3208533855","https://openalex.org/W3215125479","https://openalex.org/W4205104754","https://openalex.org/W4224957064","https://openalex.org/W4320858982","https://openalex.org/W4365936110","https://openalex.org/W4393137754","https://openalex.org/W6711927193","https://openalex.org/W6724049718","https://openalex.org/W6849661824","https://openalex.org/W6849720384","https://openalex.org/W6862964382"],"related_works":["https://openalex.org/W3116367236","https://openalex.org/W2613850739","https://openalex.org/W2978075708","https://openalex.org/W2321203572","https://openalex.org/W4386066492","https://openalex.org/W4313317283","https://openalex.org/W4280589839","https://openalex.org/W4214940796","https://openalex.org/W4376870905","https://openalex.org/W3168932674"],"abstract_inverted_index":{"In":[0],"post-quantum":[1],"cryptography":[2,178],"(PQC),":[3],"Learning":[4],"With":[5],"Errors":[6],"(LWE)":[7],"is":[8,165],"one":[9,82],"of":[10,47,66,78,89,95,97,104,114,126,158,163,171,177],"the":[11,23,38,42,52,76,79,86,98,111,124,127,131,145,150,153,160],"dominant":[12],"underlying":[13,53],"mathematical":[14],"problems.":[15],"For":[16,138],"example,":[17],"in":[18,45,148,174,181],"NIST\u2019s":[19],"PQC":[20],"standardization":[21,31],"process,":[22],"Key":[24],"Encapsulation":[25],"Mechanism":[26],"(KEM)":[27],"protocol":[28],"chosen":[29],"for":[30,50,56,109],"was":[32],"Kyber,":[33,134],"an":[34,116],"LWE-based":[35,132],"scheme.":[36],"Recently":[37],"dual":[39,63,128],"attack":[40,44,64,129],"surpassed":[41],"primal":[43],"terms":[46],"concrete":[48],"complexity":[49,113,125],"solving":[51],"LWE":[54],"problem":[55],"multiple":[57],"cryptographic":[58],"schemes,":[59],"including":[60],"Kyber.":[61],"The":[62],"consists":[65,103],"a":[67,71,92,106],"reduction":[68],"part":[69],"and":[70,136,152],"distinguishing":[72,80],"part.":[73],"When":[74],"estimating":[75],"cost":[77,88,162],"part,":[81],"has":[83],"to":[84,122],"estimate":[85],"expected":[87,112,161],"enumerating":[90],"over":[91],"certain":[93],"number":[94],"positions":[96],"secret":[99],"key.":[100],"Our":[101],"contribution":[102],"giving":[105],"polynomial-time":[107],"approach":[108],"calculating":[110,159],"such":[115],"enumeration":[117,164],"procedure.":[118],"This":[119],"allows":[120],"us":[121],"revise":[123],"on":[130],"protocols":[133],"Saber":[135],"TFHE.":[137],"all":[139],"these":[140],"schemes":[141],"we":[142],"improve":[143],"upon":[144],"total":[146],"bit-complexity":[147],"both":[149],"classical":[151],"quantum":[154],"setting.As":[155],"our":[156],"method":[157],"fairly":[166],"general,":[167],"it":[168],"might":[169],"be":[170],"independent":[172],"interest":[173],"other":[175,182],"areas":[176],"or":[179],"even":[180],"research":[183],"areas.":[184]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
