Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Thomas Wunderer is active.

Publication


Featured researches published by Thomas Wunderer.


international conference on progress in cryptology | 2016

On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack

Johannes A. Buchmann; Florian Göpfert; Rachel Player; Thomas Wunderer

The security of many cryptographic schemes has been based on special instances of the Learning with Errors LWE problem, e.g., Ring-LWE, LWE with binary secret, or LWE with ternary error. However, recent results show that some subclasses are weaker than expected. In this work we show that LWE with binary error, introduced by Micciancio and Peikert, is one such subclass. We achieve this by applying the Howgrave-Graham attack on NTRU, which is a combination of lattice techniques and a Meet-in-the-Middle approach, to this setting. We show that the attack outperforms all other currently existing algorithms for several natural parameter sets. For instance, for the parameter set


international conference on the theory and application of cryptology and information security | 2017

Revisiting the Expected Cost of Solving uSVP and Applications to LWE

Martin R. Albrecht; Florian Göpfert; Fernando Virdia; Thomas Wunderer


international conference on security and cryptography | 2018

Estimate All the {LWE, NTRU} Schemes!

Martin R. Albrecht; Benjamin R. Curtis; Amit Deo; Alex Davidson; Rachel Player; Eamonn W. Postlethwaite; Fernando Virdia; Thomas Wunderer

n=256


International Workshop on Post-Quantum Cryptography | 2017

A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE

Florian Göpfert; Christine van Vredendaal; Thomas Wunderer


international conference on cryptology in india | 2017

Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^\alpha q^\beta

Patrick Holzer; Thomas Wunderer; Johannes A. Buchmann

,


international conference on information security | 2018

Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE

Yuntao Wang; Thomas Wunderer


IACR Cryptology ePrint Archive | 2016

Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates.

Thomas Wunderer

m=512


IACR Cryptology ePrint Archive | 2017

A Quantum Attack on LWE with Arbitrary Error Distribution.

Florian Göpfert; Christine van Vredendaal; Thomas Wunderer


IACR Cryptology ePrint Archive | 2018

Estimate all the {LWE, NTRU} schemes!

Martin R. Albrecht; Benjamin R. Curtis; Amit Deo; Alex Davidson; Rachel Player; Eamonn W. Postlethwaite; Fernando Virdia; Thomas Wunderer

,


IACR Cryptology ePrint Archive | 2017

Revisiting the Expected Cost of Solving uSVP and Applications to LWE.

Martin R. Albrecht; Florian Göpfert; Fernando Virdia; Thomas Wunderer

Collaboration


Dive into the Thomas Wunderer's collaboration.

Top Co-Authors

Avatar

Florian Göpfert

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Johannes A. Buchmann

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Christine van Vredendaal

Eindhoven University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge