1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
// Copyright © 2023 Marvin Beckmann
//
// This file is part of qFALL-tools.
//
// qFALL-tools is free software: you can redistribute it and/or modify it under
// the terms of the Mozilla Public License Version 2.0 as published by the
// Mozilla Foundation. See <https://mozilla.org/en-US/MPL/2.0/>.
//! Contains implementations for G-trapdoors in the classical and
//! ring setting, enabling efficient preimage sampling.
//!
//! The main references are listed in the following
//! and will be further referenced in submodules by these numbers:
//! - \[1\] Micciancio, D., Peikert, C. (2012).
//! Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller.
//! In: Pointcheval, D., Johansson, T. (eds) Advances in Cryptology – EUROCRYPT 2012.
//! EUROCRYPT 2012. Lecture Notes in Computer Science, vol 7237.
//! Springer, Berlin, Heidelberg. <https://doi.org/10.1007/978-3-642-29011-4_41>
//! - \[2\] El Bansarkhani, R., Buchmann, J. (2014). Improvement and Efficient
//! Implementation of a Lattice-Based Signature Scheme. In: Lange, T., Lauter, K.,
//! Lisoněk, P. (eds) Selected Areas in Cryptography -- SAC 2013. SAC 2013. Lecture Notes
//! in Computer Science(), vol 8282. Springer, Berlin, Heidelberg.
//! <https://doi.org/10.1007/978-3-662-43414-7_3>
//! - \[3\] Gür, K.D., Polyakov, Y., Rohloff, K., Ryan, G.W. and Savas, E., 2018,
//! January. Implementation and evaluation of improved Gaussian sampling for lattice
//! trapdoors. In Proceedings of the 6th Workshop on Encrypted Computing & Applied
//! Homomorphic Cryptography (pp. 61-71). <https://dl.acm.org/doi/pdf/10.1145/3267973.3267975>
//! - \[4\] Cash, D., Hofheinz, D., Kiltz, E., & Peikert, C. (2012).
//! Bonsai trees, or how to delegate a lattice basis. Journal of cryptology, 25, 601-639.
//! <https://doi.org/10.1007/s00145-011-9105-2>
//! - \[5\] Chen, Yuanmi, and Phong Q. Nguyen. "BKZ 2.0: Better lattice security
//! estimates." International Conference on the Theory and Application of Cryptology and
//! Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.