D. Aggarwal, D. Dadush, O. Regev, and N. Stephens-davidowitz, Solving the shortest vector problem in 2 n time using discrete gaussian sampling: Extended abstract, Proceedings of 47th ACM STOC, pp.733-742, 2015.

M. Ajtai, Generating hard instances of lattice problems, Proc. 28th ACM STOC, pp.99-108, 1996.

M. Ajtai, R. Kumar, and D. Sivakumar, A sieve algorithm for the shortest lattice vector problem, Proc. of 33rd STOC, pp.601-610, 2001.

M. Albrecht, J. Schanck, and D. Bernstein, Messages on the NIST pqc mailing-list in May, 2018.

M. R. Albrecht, B. R. Curtis, A. Deo, A. Davidson, R. Player et al., Estimate all the LWE, NTRU schemes! Posted on the pqc-forum on, 2018.

M. R. Albrecht, L. Ducas, G. Herold, E. Kirshanova, E. Postlethwaite et al., New records for lattice SVP challenges, 2018.

E. Alkim, N. Bindel, J. A. Buchmann, ¨. O. Dagdelen, E. Eaton et al., Revisiting TESLA in the quantum random oracle model, Proc. PQCrypto, vol.10346, pp.143-162, 2017.

E. Alkim, L. Ducas, T. Pöppelmann, and P. Schwabe, Post-quantum key exchange-A new hope, Proc. 25th USENIX, pp.327-343, 2016.

A. Ambainis and M. Kokainis, Quantum algorithm for tree size estimation, with applications to backtracking and 2-player games, Proc. STOC '17, 2017.

Y. Aono and P. Q. Nguyen, Random sampling revisited: Lattice enumeration with discrete pruning, Advances in cryptology-EUROCRYPT 2017 Part II, vol.10211, pp.65-102, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01502051

Y. Aono, P. Q. Nguyen, T. Seito, and J. Shikata, Lower bounds on lattice enumeration with extreme pruning, Proc. of 38th CRYPTO, Part II, vol.10992, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01845023

Y. Aono, Y. Wang, T. Hayashi, and T. Takagi, Improved progressive BKZ algorithms and their precise cost estimation by sharp simulator, IACR Cryptology ePrint Archive, p.146, 2016.

L. Babai, On Lovász' lattice reduction and the nearest lattice point problem, Proc. STACS'85, vol.182, pp.13-20, 1985.

A. Becker, L. Ducas, N. Gama, and T. Laarhoven, New directions in nearest neighbor searching with applications to lattice sieving, Proc. 27th ACM-SIAM Symposium on Discrete Algorithms (SODA), pp.10-24, 2016.
URL : https://hal.archives-ouvertes.fr/hal-02177623

C. H. Bennett, Time/space trade-offs for reversible computation, SIAM J. Comput, vol.18, issue.4, pp.766-776, 1989.

Y. Aono, Q. Phong, Y. Nguyen, and . Shen,

J. Buchmann, N. Büscher, F. Göpfert, S. Katzenbeisser, J. Krämer et al., Creating cryptographic challenges using multi-party computation: The lwe challenge, Proceedings of the 3rd ACM AsiaPKC, pp.11-20, 2016.

Y. Chen, Réduction de réseau et sécurité concrète du chiffrementcompì etement homomorphe, 2013.

Y. Chen and P. Q. Nguyen, BKZ 2.0: better lattice security estimates, Proc. ASIACRYPT, vol.7073, pp.1-20, 2011.
URL : https://hal.archives-ouvertes.fr/hal-01109961

R. Pino, V. Lyubashevsky, and D. Pointcheval, The whole is less than the sum of its parts: Constructing more efficient lattice-based AKEs, Proc. SCN 2016, vol.9841, pp.273-291, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01378005

M. Fukase and K. Kashiwabara, An accelerated algorithm for solving SVP based on statistical analysis, JIP, vol.23, issue.1, pp.67-80, 2015.

N. Gama and P. Q. Nguyen, Predicting Lattice Reduction, Proc. of Eurocrypt'08, pp.31-51, 2008.
DOI : 10.1007/978-3-540-78967-3_3

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-78967-3_3.pdf

N. Gama, P. Q. Nguyen, and O. Regev, Lattice enumeration using extreme pruning, EUROCRYPT 2010, vol.6110, 2010.
DOI : 10.1007/978-3-642-13190-5_13

URL : https://hal.archives-ouvertes.fr/hal-01083526

O. Goldreich, S. Goldwasser, and S. Halevi, Public-key cryptosystems from lattice reduction problems, Proc. CRYPTO, vol.1294, pp.112-131, 1997.
DOI : 10.1007/bfb0052231

URL : https://link.springer.com/content/pdf/10.1007%2FBFb0052231.pdf

A. Hülsing, J. Rijneveld, J. M. Schanck, and P. Schwabe, Ntru-hrss-kem: Algorithm specifications and supporting documentation. NIST submission

R. Kannan, Improved algorithms for integer programming and related lattice problems, Proc. 15th ACM STOC, pp.193-206, 1983.
DOI : 10.1145/800061.808749

T. Laarhoven, Sieving for shortest vectors in lattices using angular locality-sensitive hashing, Proc. CRYPTO 2015-Part I, vol.9215, 2015.
DOI : 10.1007/978-3-662-47989-6_1

URL : http://eprint.iacr.org/2014/744.pdf

T. Laarhoven, M. Mosca, and J. Van-de-pol, Finding shortest lattice vectors faster using quantum search, Des. Codes Cryptography, vol.77, issue.2-3, pp.375-400, 2015.
DOI : 10.1007/s10623-015-0067-5

URL : http://doi.org/10.1007/s10623-015-0067-5

R. Lindner and C. Peikert, Better key sizes (and attacks) for lwe-based encryption, CT-RSA, vol.6558, pp.319-339, 2011.
DOI : 10.1007/978-3-642-19074-2_21

URL : http://www.cc.gatech.edu/~cpeikert/pubs/lwe-analysis.pdf

R. Lindner and M. Rückert,

M. Liu and P. Q. Nguyen, Solving BDD by enumeration: An update, Topics in Cryptology-Proc. CT-RSA 2013, vol.7779, 2013.
DOI : 10.1007/978-3-642-36095-4_19

URL : https://hal.archives-ouvertes.fr/hal-00864361

C. Ludwig, A faster lattice reduction method using quantum search, Proceedings, volume 2906 of LNCS, pp.199-208, 2003.
DOI : 10.1007/978-3-540-24587-2_22

D. Micciancio and P. Voulgaris, A deterministic single exponential time algorithm for most lattice problems based on Voronoi cell computations, Proc. 42nd ACM Symp. on Theory of Computing (STOC), 2010.
DOI : 10.1137/100811970

D. Micciancio and P. Voulgaris, Faster exponential time algorithms for the shortest vector problem, Proc. ACM-SIAM SODA, pp.1468-1480, 2010.
DOI : 10.1137/1.9781611973075.119

URL : https://epubs.siam.org/doi/pdf/10.1137/1.9781611973075.119

A. Montanaro, Quantum walk speedup of backtracking algorithms, 2015.

P. Q. Nguyen and I. Shparlinski, The insecurity of the digital signature algorithm with partially known nonces, J. Cryptology, vol.15, issue.3, pp.151-176, 2002.

P. Q. Nguyen and T. Vidick, Sieve algorithms for the shortest vector problem are practical, J. of Mathematical Cryptology, vol.2, issue.2, pp.181-207, 2008.
DOI : 10.1515/jmc.2008.009

, Round 1 submissions for post-quantum cryptography standardization

M. Pohst, On the computation of lattice vectors of minimal length, successive minima and reduced bases with applications, SIGSAM Bull, vol.15, issue.1, pp.37-44, 1981.

O. Regev, On lattices, learning with errors, random linear codes, and cryptography, Proc. 37th ACM STOC, pp.84-93, 2005.
DOI : 10.1145/1568318.1568324

M. Schneider and N. Gama, SVP challenge. Available at

C. P. Schnorr, Lattice reduction by random sampling and birthday methods, Proc. STACS, vol.2607, pp.145-156, 2003.

C. Schnorr and M. Euchner, Lattice basis reduction: improved practical algorithms and solving subset sum problems, Math. Programming, vol.66, pp.181-199, 1994.

C. Schnorr and H. H. Hörner, Attacking the Chor-Rivest cryptosystem by improved lattice reduction, Proc. of Eurocrypt '95, vol.921, p.44, 1995.

Y. Yu and L. Ducas, Second order statistical behavior of LLL and BKZ, Proc. SAC 2017, pp.3-22, 2017.