CSE206A: Projects
For the project, you can choose among several possibilities, e.g.,
- Explore a topic not covered in class by reading a small number
of related papers (typically, 2 or 3), and writing a creative summary
that explains the problem addressed in the papers, known solutions,
and open problems. No original research result is expected as part of the
project, but you should at least be able to describe what the open
problems are in the specific area considered in your project.
- Experiment with lattice reduction algorithms, and write a report
on your work. Typically, this will address a cryptanalysis problem,
but other applications of lattices are fine too.
You can try to attack a new cryptanalysis problem if you wish, or
more simply try to reproduce and extend the results from some
published paper. Since some of the papers below were published 10 or
more years ago, you may find out that what you can or cannot do within
a reasonable amount of time with today's computers is quite different
from what could be done when the paper was written.
-
Solve any of the open problems given in class, and write a paper about it.
This may be quite challenging, but even partial results
would make a fine project.
- If you wish to do something that does not fit the above options,
just talk to the instructor.
You can work on the project in teams of two. Once you select a project topic,
let me know, so I can give you additional pointers and suggestions.
Here are some ideas for possible project topics:
- Chinese Reminder Codes: using lattices to decode error correcting codes
based on CRT.
- Guruswami, Sahai, Sudan, Soft-decision
Decoding of Chinese Remainder Codes, FOCS 2000
- Boneh, Finding
Smooth Integers in Short Intervals Using CRT Decoding, JCSS
64:768-784, 2002. (Prelim. STOC 2000)
- Goldreich, Ron, Sudan, Chinese
Remaindering with Errors, IEEE Trans. on IT 46(4):1330-1338,
2000. (Prelim. STOC 1999)
- Improving the LLL approximation factor
- Speeding up LLL reduction:
- HNF algorithms
- Micciancio, Warinschi, A linear
space algorithm for computing the Hermite normal form , ISSAC
2001
- Storjohan, Computing Hermite and Smith normal forms of triangular
integer matrices, Linear Algebra and its Applications,
282(1-3):25-45, 1998
- Storjohan, Labahn, Asymptotically fast
computation of Hermite normal forms of integer matrices, ISSAC
1996.
- Cryptanalysis of DSS under various attack scenarios:
You can find many other links to papers related to lattice algorithms and
applications at the following sites.
If you want to learn more about lattice cryptanalysis, the following
survey papers cover a wide range of applications and attacks:
Below is a list of papers describing lattice attacks that appeared in
conferences like Crypto, Eurocrypt, Asiacrypt, PKC, SAC, etc. The papers are
listed in reverse chronological order, so some of the papers at the bottom of
the list contain among the simplest lattice based attacks..
Here are a few more papers about lattice algorithms and applications: