Florian Göpfert
Technische Universität Darmstadt
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Florian Göpfert.
selected areas in cryptography | 2013
Johannes A. Buchmann; Daniel Cabarcas; Florian Göpfert; Andreas Hülsing; Patrick Weiden
Several lattice-based cryptosystems require to sample from a discrete Gaussian distribution over the integers. Existing methods to sample from such a distribution either need large amounts of memory or they are very slow. In this paper we explore a different method that allows for a flexible time-memory trade-off, offering developers freedom in choosing how much space they can spare to store precomputed values. We prove that the generated distribution is close enough to a discrete Gaussian to be used in lattice-based cryptography. Moreover, we report on an implementation of the method and compare its performance to existing methods from the literature. We show that for large standard deviations, the Ziggurat algorithm outperforms all existing methods.
international conference on information security and cryptology | 2013
Martin R. Albrecht; Robert Fitzpatrick; Florian Göpfert
We present a study of the concrete complexity of solving instances of the unique shortest vector problem (uSVP). In particular, we study the complexity of solving the Learning with Errors (LWE) problem by reducing the Bounded-Distance Decoding (BDD) problem to uSVP and attempting to solve such instances using the ‘embedding’ approach. We experimentally derive a model for the success of the approach, compare to alternative methods and demonstrate that for the LWE instances considered in this work, reducing to uSVP and solving via embedding compares favorably to other approaches.
international conference on progress in cryptology | 2016
Johannes A. Buchmann; Florian Göpfert; Rachel Player; Thomas Wunderer
The security of many cryptographic schemes has been based on special instances of the Learning with Errors LWE problem, e.g., Ring-LWE, LWE with binary secret, or LWE with ternary error. However, recent results show that some subclasses are weaker than expected. In this work we show that LWE with binary error, introduced by Micciancio and Peikert, is one such subclass. We achieve this by applying the Howgrave-Graham attack on NTRU, which is a combination of lattice techniques and a Meet-in-the-Middle approach, to this setting. We show that the attack outperforms all other currently existing algorithms for several natural parameter sets. For instance, for the parameter set
international conference on progress in cryptology | 2014
Robert Fitzpatrick; Christian H. Bischof; Johannes A. Buchmann; Özgür Dagdelen; Florian Göpfert; Artur Mariano; Bo-Yin Yang
international conference on progress in cryptology | 2014
Özgür Dagdelen; Rachid El Bansarkhani; Florian Göpfert; Tim Güneysu; Tobias Oder; Thomas Pöppelmann; Ana Helena Sánchez; Peter Schwabe
n=256
public key cryptography | 2016
Johannes A. Buchmann; Niklas Büscher; Florian Göpfert; Stefan Katzenbeisser; Juliane Krämer; Daniele Micciancio; Sander Siim; Christine van Vredendaal; Michael Walter
international conference on the theory and application of cryptology and information security | 2017
Martin R. Albrecht; Florian Göpfert; Fernando Virdia; Thomas Wunderer
,
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security | 2016
Johannes A. Buchmann; Florian Göpfert; Tim Güneysu; Tobias Oder; Thomas Pöppelmann
Journal of Mathematical Cryptology | 2018
Nina Bindel; Johannes A. Buchmann; Florian Göpfert; Markus Schmidt
m=512
International Workshop on Post-Quantum Cryptography | 2017
Florian Göpfert; Christine van Vredendaal; Thomas Wunderer