Information
Authors
- Carlos Aguilar Melchor, University of Toulouse (FR)
- Nicolas Aragon, University of Limoges & DGA (FR)
- Slim Bettaieb, Worldline (FR)
- Loïc Bidoux, Worldline (FR)
- Olivier Blazy, University of Limoges (FR)
- Jean-Christophe Deneuville, INSA-CVL & University of Limoges (FR)
- Philippe Gaborit, University of Limoges (FR)
- Edoardo Persichetti, Florida Atlantic University (US)
- Gilles Zémor, University of Bordeaux (FR)
Official Links
- Official Website
- Official Comments: Round 1, Round 2
Related Articles
Attack on LAC Key Exchange in Misuse Situation
Aurelien Greuet and Simon Montoya and Guenael Renault.
Cryptology ePrint Archive: Report 2020/063, 21 Jan 2020.
A Novel CCA Attack using Decryption Errors against LAC
Qian Guo and Thomas Johansson and Jing Yang.
ASIACRYPT 2019, November 2019.
LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus
Xianhui Lu and Yamin Liu and Zhenfei Zhang and Dingding Jia and Haiyang Xue and Jingnan He and Bao Li and Kunpeng Wang.
Cryptology ePrint Archive: Report 2018/1009, Oct 2018.
On the impact of decryption failures on the security of LWE/LWR based schemes
Jan-Pieter D’Anvers, Frederik Vercauteren, and Ingrid Verbauwhede.
Cryptology ePrint Archive: Report 2018/1089, Nov 2018.
Summary Table
LAC | |||
---|---|---|---|
ROUND 1 | ROUND 2 | ||
Description | lattice | ||
Assumption | poly-LWE | ||
Functionality | KEM | ||
Public Key
(bytes) |
|
| |
Secret Key
(bytes) |
|
| |
CIPH/SIG
(bytes) |
|
| |
Security
Type |
IND-CCA |