sri venkatesh - Academia.edu (original) (raw)
Papers by sri venkatesh
ArXiv, 2019
LWE-based cryptosystems are an attractive alternative to traditional ones in the post-quantum era... more LWE-based cryptosystems are an attractive alternative to traditional ones in the post-quantum era. To minimize the storage cost of part of its public key - a 256times640256 \times 640256times640 integer matrix, textbfT\textbf{T}textbfT - a binary version of textbfT\textbf{T}textbfT has been proposed. One component of its ciphertext, textbfc1\textbf{c}_{1}textbfc1 is computed as textbfc1=textbfTu\textbf{c}_{1} = \textbf{Tu}textbfc1=textbfTu where textbfu\textbf{u}textbfu is an ephemeral secret. Knowing textbfu\textbf{u}textbfu, the plaintext can be deduced. Given textbfc1\textbf{c}_{1}textbfc1 and textbfT\textbf{T}textbfT, Galbraith's challenge is to compute textbfu\textbf{u}textbfu with existing computing resources in 1 year. Our hybrid approach guesses and removes some bits of the solution vector and maps the problem of solving the resulting sub-instance to the Closest Vector Problem in Lattice Theory. The lattice-based approach reduces the number of bits to be guessed while the initial guess based on LP relaxation reduces the number of subsequent guesses to polynomial rather than exponential in the number of guessed bits. Fur...
Journal of Hardware and Systems Security, 2019
Hazardous Waste and Hazardous Materials, 1996
A test program was performed at the Environmental Protection Agency Incineration Research Facilit... more A test program was performed at the Environmental Protection Agency Incineration Research Facility to study the effectiveness of incineration at low-to-moderate volatilities (boiling points). The data in the Appendix contain: incinerator operating data, laboratory analyses, sample train worksheets, and data analysis worksheets.
ArXiv, 2019
LWE-based cryptosystems are an attractive alternative to traditional ones in the post-quantum era... more LWE-based cryptosystems are an attractive alternative to traditional ones in the post-quantum era. To minimize the storage cost of part of its public key - a 256times640256 \times 640256times640 integer matrix, textbfT\textbf{T}textbfT - a binary version of textbfT\textbf{T}textbfT has been proposed. One component of its ciphertext, textbfc1\textbf{c}_{1}textbfc1 is computed as textbfc1=textbfTu\textbf{c}_{1} = \textbf{Tu}textbfc1=textbfTu where textbfu\textbf{u}textbfu is an ephemeral secret. Knowing textbfu\textbf{u}textbfu, the plaintext can be deduced. Given textbfc1\textbf{c}_{1}textbfc1 and textbfT\textbf{T}textbfT, Galbraith's challenge is to compute textbfu\textbf{u}textbfu with existing computing resources in 1 year. Our hybrid approach guesses and removes some bits of the solution vector and maps the problem of solving the resulting sub-instance to the Closest Vector Problem in Lattice Theory. The lattice-based approach reduces the number of bits to be guessed while the initial guess based on LP relaxation reduces the number of subsequent guesses to polynomial rather than exponential in the number of guessed bits. Fur...
Journal of Hardware and Systems Security, 2019
Hazardous Waste and Hazardous Materials, 1996
A test program was performed at the Environmental Protection Agency Incineration Research Facilit... more A test program was performed at the Environmental Protection Agency Incineration Research Facility to study the effectiveness of incineration at low-to-moderate volatilities (boiling points). The data in the Appendix contain: incinerator operating data, laboratory analyses, sample train worksheets, and data analysis worksheets.