Phong Q. Nguyen’s research while affiliated with French National Centre for Scientific Research and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (85)


Figure 1. Profile of a 1-round BKZ-84 reduced basis of the Mertens lattice for N = 120, ν = 130, ν y = 100, ν t = 15, and α * = α exp(−1.5 · 10 −6 γ 2 ).
Figure 2. Correlations between h StR (y) and partial sums for N = 120.
Figure 3. Correlations between ∥u − t∥ 2 and h StR (y) for N = 120, where u is the lattice point corresponding to y.
Best values of y for the function h P
Best values of y for the function h StR
On counterexamples to the Mertens conjecture
  • Preprint
  • File available

February 2025

Seungki Kim

·

Phong Q. Nguyen

We use state-of-art lattice algorithms to improve the upper bound on the lowest counterexample to the Mertens conjecture to exp(1.96×1019)\approx \exp(1.96 \times 10^{19}), which is significantly below the conjectured value of exp(5.15×1023)\approx \exp(5.15 \times 10^{23}) by Kotnik and van de Lune [KvdL04].

Download


A Complete Analysis of the BKZ Lattice Reduction Algorithm

December 2024

·

9 Reads

·

13 Citations

Journal of Cryptology

We present the first rigorous dynamic analysis of BKZ, the most widely used lattice reduction algorithm besides LLL: we provide guarantees on the quality of the current lattice basis during execution. Previous analyses were either heuristic or only applied to theoretical variants of BKZ, not the real BKZ implemented in software libraries. Our analysis extends to a generic BKZ algorithm where the SVP-oracle is replaced by an approximate oracle and/or the basis update is not necessarily performed by LLL. As an application, we observe that in certain approximation regimes, it is more efficient to use BKZ with an approximate rather than exact SVP-oracle.


Pruned Enumeration for BDD of unbalanced lattices (slight variant version of [5, 16])
Profile of a 1-round BKZ-84 reduced basis of the Mertens lattice for N=120\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$N=120$$\end{document}, ν=130\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\nu = 130$$\end{document}, νy=100\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\nu _y = 100$$\end{document}, νt=15\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\nu _t = 15$$\end{document}, and α∗=αexp(-1.5·10-6γ2)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\alpha ^* = \alpha \exp (-1.5 \cdot 10^{-6}\gamma ^2)$$\end{document}
Correlations between hStR(y)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$h_{StR}(y)$$\end{document} and partial sums for N=120\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$N=120$$\end{document}
Correlations between ‖u-t‖2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Vert \textbf{u}-\textbf{t}\Vert ^2$$\end{document} and hStR(y)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$h_{StR}(y)$$\end{document} for N=120\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$N=120$$\end{document}, where u\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\textbf{u}$$\end{document} is the lattice point corresponding to y
On counterexamples to the Mertens conjecture

December 2024

·

1 Read

·

1 Citation

Research in Number Theory

We use state-of-art lattice algorithms to improve the upper bound on the lowest counterexample to the Mertens conjecture to exp(1.96×1019)\approx \exp (1.96 \times 10^{19}), which is significantly below the conjectured value of exp(5.15×1023)\approx \exp (5.15 \times 10^{23}) by Kotnik and van de Lune (Exp Math 13:473–481, 2004).


Slide Reduction, Revisited—Filling the Gaps in SVP Approximation

August 2020

·

28 Reads

·

31 Citations

Lecture Notes in Computer Science

We show how to generalize Gama and Nguyen’s slide reduction algorithm [STOC ’08] for solving the approximate Shortest Vector Problem over lattices (SVP) to allow for arbitrary block sizes, rather than just block sizes that divide the rank n of the lattice. This leads to significantly better running times for most approximation factors. We accomplish this by combining slide reduction with the DBKZ algorithm of Micciancio and Walter [Eurocrypt ’16].


Slide Reduction, Revisited---Filling the Gaps in SVP Approximation

August 2019

·

45 Reads

We show how to generalize Gama and Nguyen's slide reduction algorithm [STOC '08] for solving the approximate Shortest Vector Problem over lattices (SVP). As a result, we show the fastest provably correct algorithm for δ\delta-approximate SVP for all approximation factors n1/2+εδnO(1)n^{1/2+\varepsilon} \leq \delta \leq n^{O(1)}. This is the range of approximation factors most relevant for cryptography.


Computing a Lattice Basis Revisited

July 2019

·

55 Reads

·

7 Citations

Given (a,b) \in \mZ^2, Euclid's algorithm outputs the generator \gcd(a,b) of the ideal a\mZ + b\mZ. Computing a lattice basis is a high-dimensional generalization: given \mathbfa _1,\dots,\veca _n \in \mZ^m, find a \mZ-basis of the lattice L=\ \sum_i=1 ^n x_i \veca _i, x_i \in \mZ\ generated by the \veca _i's. The fastest algorithms known are HNF algorithms, but are not adapted to all applications, such as when the output should not be much longer than the input. We present an algorithm which extracts such a short basis within the same time as an HNF, by reduction to HNF. We also present an HNF-less algorithm, which reduces to Euclid's extended algorithm and can be generalized to quadratic forms. Both algorithms can extend primitive sets into bases.


Quantum Lattice Enumeration and Tweaking Discrete Pruning: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part I

October 2018

·

18 Reads

·

16 Citations

Lecture Notes in Computer Science

Enumeration is a fundamental lattice algorithm. We show how to speed up enumeration on a quantum computer, which affects the security estimates of several lattice-based submissions to NIST: if T is the number of operations of enumeration, our quantum enumeration runs in roughly operations. This applies to the two most efficient forms of enumeration known in the extreme pruning setting: cylinder pruning but also discrete pruning introduced at Eurocrypt ’17. Our results are based on recent quantum tree algorithms by Montanaro and Ambainis-Kokainis. The discrete pruning case requires a crucial tweak: we modify the preprocessing so that the running time can be rigorously proved to be essentially optimal, which was the main open problem in discrete pruning. We also introduce another tweak to solve the more general problem of finding close lattice vectors.


Lower Bounds on Lattice Enumeration with Extreme Pruning: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II

July 2018

·

18 Reads

·

9 Citations

Lecture Notes in Computer Science

At Eurocrypt ’10, Gama, Nguyen and Regev introduced lattice enumeration with extreme pruning: this algorithm is implemented in state-of-the-art lattice reduction software and used in challenge records. They showed that extreme pruning provided an exponential speed-up over full enumeration. However, no limit on its efficiency was known, which was problematic for long-term security estimates of lattice-based cryptosystems. We prove the first lower bounds on lattice enumeration with extreme pruning: if the success probability is lower bounded, we can lower bound the global running time taken by extreme pruning. Our results are based on geometric properties of cylinder intersections and some form of isoperimetry. We discuss their impact on lattice security estimates.


Random Sampling Revisited: Lattice Enumeration with Discrete Pruning

April 2017

·

27 Reads

·

46 Citations

Lecture Notes in Computer Science

In 2003, Schnorr introduced Random sampling to find very short lattice vectors, as an alternative to enumeration. An improved variant has been used in the past few years by Kashiwabara et al. to solve the largest Darmstadt SVP challenges. However, the behaviour of random sampling and its variants is not well-understood: all analyses so far rely on a questionable heuristic assumption, namely that the lattice vectors produced by some algorithm are uniformly distributed over certain parallelepipeds. In this paper, we introduce lattice enumeration with discrete pruning, which generalizes random sampling and its variants, and provides a novel geometric description based on partitions of the n-dimensional space. We obtain what is arguably the first sound analysis of random sampling, by showing how discrete pruning can be rigorously analyzed under the well-known Gaussian heuristic, in the same model as the Gama-Nguyen-Regev analysis of pruned enumeration from EUROCRYPT ’10, albeit using different tools: we show how to efficiently compute the volume of the intersection of a ball with a box, and to efficiently approximate a large sum of many such volumes, based on statistical inference. Furthermore, we show how to select good parameters for discrete pruning by enumerating integer points in an ellipsoid. Our analysis is backed up by experiments and allows for the first time to reasonably estimate the success probability of random sampling and its variants, and to make comparisons with previous forms of pruned enumeration. Our work unifies random sampling and pruned enumeration and show that they are complementary of each other: both have different characteristics and offer different trade-offs to speed up enumeration.


Citations (71)


... However, up to now, there are no efficient algorithms for solving SVPs of relevant size. To facilitate the solution of an SVP, algorithms like the Lenstra-Lenstra-Lovász basis reduction algorithm (LLL algorithm) or the Block Korkine-Zolotarev algorithm (BKZ algorithm) are utilized [8], [11], [13], [16], [21]. These algorithms consider the solutions of SVPs as elements of a lattice and transform the basis of this lattice such that the new basis is almost orthogonal and consisting of short vectors. ...

Reference:

A parameter study for LLL and BKZ with application to shortest vector problems
A Complete Analysis of the BKZ Lattice Reduction Algorithm
  • Citing Article
  • December 2024

Journal of Cryptology

... To that end, it is convenient to first define the notion of twin reduction. (The analogous notion for lattices is implicit in [GN08] and formally defined in [ALNS20].) β] is forward reduced and B [2,β+1] is backward reduced. ...

Slide Reduction, Revisited—Filling the Gaps in SVP Approximation
  • Citing Chapter
  • August 2020

Lecture Notes in Computer Science

... Recent papers considering general lattice basis computation focus on properties of the resulting basis but do not improve the running time. There are several algorithms that preserve orthogonality from the original matrix, e. g. ∥B * ∥ ≤ ∥A * ∥, or improve on the ℓ ∞ norm of the resulting matrix [NSV11,NS16], or both [HPS11, LN19,CN97,MG02]. Except for an algorithm by Lin and Nguyen [LN19], all of the above algorithms have a significantly higher time complexity compared to Labahn's and Storjohann's HNF algorithm. ...

Computing a Lattice Basis Revisited
  • Citing Conference Paper
  • July 2019

... Since the introduction of lattice-based cryptography, its concrete security estimate has been under long-term research. Significant progress has been made to improve the asymptotical and practical efficiency of SVP and lattice reduction algorithms [13][14][15][16][17][18][19] and to better understand their behaviours [20][21][22][23]. Based on the cost models of SVP and lattice reduction, some generic cryptanalysis methodologies were presented with extensive experimental verifications [24][25][26]. ...

Quantum Lattice Enumeration and Tweaking Discrete Pruning: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part I
  • Citing Chapter
  • October 2018

Lecture Notes in Computer Science

... SE-ENUM is relatively efficient in practice, at least up to dimension 50 for a normal computer. There are many improvements for SE-ENUM aiming at pruning the search tree and shrink the search bounds [4,5,15]. However, our work is relevant to the original SE-ENUM directly, so we do not introduce the details of other improvements here. ...

Lower Bounds on Lattice Enumeration with Extreme Pruning: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II
  • Citing Chapter
  • July 2018

Lecture Notes in Computer Science

... Despite SVP's difficulty, there are mainly two types of SVP algorithms that have been well studied: enumeration algorithms, requiring 2 O(n log n) time and poly(n) space in n-dimensional lattice (Kannan 1983;Aono and Nguyen 2017;Doulgerakis et al. 2020); and sieving algorithms, which cost 2 O(n) time and space (Ajtai et al. 2001;Nguyen and Vidick 2008;Laarhoven 2019). Nevertheless, there are still no polynomial-time algorithms for solving general SVP. ...

Random Sampling Revisited: Lattice Enumeration with Discrete Pruning
  • Citing Conference Paper
  • April 2017

Lecture Notes in Computer Science

... The GSW scheme still needs to achieve full homomorphism with the help of bootstrap procedure, so the FHEW and TFHE schemes were proposed in 2014 and 2016, respectively, to optimize the bootstrap procedure and reduce the bootstrap time to less than 0.1 sec, and since then AP bootstrap and GINX bootstrap have become the dominant bootstrap in the 3rd generation of FHE scheme [4][5][6][7][8][9][10]. The Compared with the 2nd generation, the 3rd generation FHE scheme has improved the performance of the bootstrap procedure and no longer needs to control the noise growth by using the dimension-mode reduction technique, which makes the computation more efficient. ...

Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems

Lecture Notes in Computer Science

... Here "constant time" means that the running time is independent of the input lattice once the size of integers is fixed, as long as the input is valid. Existing LLL-type algorithms [LLL82,NS09b] do not have this feature: conditional swaps inside LLL depend on the shape of the lattice. Our algorithm is reminiscent of the BKZ reduction with block size 2 [Sch87]. ...

Low-dimensional lattice basis reduction revisited
  • Citing Article
  • January 2009

Lecture Notes in Computer Science