TY - GEN

T1 - Lattice enumeration using extreme pruning

AU - Gama, Nicolas

AU - Nguyen, Phong Q.

AU - Regev, Oded

PY - 2010

Y1 - 2010

N2 - Lattice enumeration algorithms are the most basic algorithms for solving hard lattice problems such as the shortest vector problem and the closest vector problem, and are often used in public-key cryptanalysis either as standalone algorithms, or as subroutines in lattice reduction algorithms. Here we revisit these fundamental algorithms and show that surprising exponential speedups can be achieved both in theory and in practice by using a new technique, which we call extreme pruning. We also provide what is arguably the first sound analysis of pruning, which was introduced in the 1990s by Schnorr et al.

AB - Lattice enumeration algorithms are the most basic algorithms for solving hard lattice problems such as the shortest vector problem and the closest vector problem, and are often used in public-key cryptanalysis either as standalone algorithms, or as subroutines in lattice reduction algorithms. Here we revisit these fundamental algorithms and show that surprising exponential speedups can be achieved both in theory and in practice by using a new technique, which we call extreme pruning. We also provide what is arguably the first sound analysis of pruning, which was introduced in the 1990s by Schnorr et al.

UR - http://www.scopus.com/inward/record.url?scp=77954651254&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77954651254&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-13190-5_13

DO - 10.1007/978-3-642-13190-5_13

M3 - Conference contribution

AN - SCOPUS:77954651254

SN - 3642131891

SN - 9783642131899

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 257

EP - 278

BT - Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings

T2 - 29th in the Series of EuropeanConferences on the Theory and Application of Cryptographic Techniques, Eurocrypt 2010

Y2 - 30 May 2010 through 3 June 2010

ER -