A curated list of research, articles, tools, and resources focused on attacks against Fully Homomorphic Encryption (FHE). This compilation is intended for researchers, practitioners, and anyone interested in the security aspects of FHE.
- On the IND-CCA1 Security of FHE Schemes
- Fully Homomorphic Encryption Beyond IND-CCA1 Security: Integrity Through Verifiability
- Attacks Against the INDCPA-D Security of Exact FHE Schemes
- On the Practical CPAD Security of "Exact" and Threshold FHE Schemes and Libraries
- On the Security of Homomorphic Encryption on Approximate Numbers
- Securing Approximate Homomorphic Encryption using Differential Privacy
- A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE
- A Successful Subfield Lattice Attack on a Fully Homomorphic Encryption Scheme
- On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL
- Revisiting the Hybrid Attack on Sparse and Ternary Secret LWE
- Revisiting Orthogonal Lattice Attacks on Approximate Common Divisor Problems and Their Applications
- Lattice Attacks on the DGHV Homomorphic Encryption Scheme
- Revisiting Lattice Attacks on Overstretched NTRU Parameters
- Benchmarking Attacks on Learning with Errors
- Hybrid Dual and Meet-LWE Attack
- Attack on Fully Homomorphic Encryption over the Integers
- Leaking Secrets in Homomorphic Encryption with Side-Channel Attacks
- Attacking FHE-based Applications by Software Fault Injections
- Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures
- A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors
- Securing FHE from Reaction-based Key Recovery Attacks
- On NTRU-ν-um Modulo X^N − 1
- Cryptanalysis of Homomorphic Encryption Schemes based on the Approximate GCD Problem
- Plaintext Recovery Attacks against Linearly Decryptable Fully Homomorphic Encryption Schemes
- On the Hardness of the Finite Field Isomorphism Problem
- Security Guidelines for Implementing Homomorphic Encryption
- Danger of Using Fully Homomorphic Encryption: A Look at Microsoft SEAL
- Model Stealing Attacks On FHE-based Privacy-Preserving Machine Learning through Adversarial Examples
- On the Security of FHE in the "Slightly Beyond Passive" Adversary Regime
- Estimating the Security of Homomorphic Encryption Schemes
- Decoding Cryptographic Security: GCD, AGCD, and Lattice Attacks
- Security and Cryptography
- New Key-Recovery Attacks Against FHE
- Damien Stehlé - Attacks Against the INDCPA-D Security of Exact FHE Schemes
- FHE Beyond IND-CCA1 Security w/ Jérôme Nguyen
- Danger of Using Fully Homomorphic Encryption - Zhiniang Peng
- On the Security of Homomorphic Encryption on Approximate Numbers
- A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded En.
- Estimating the Difficulty of Breaking Lattice-Based Cryptography w/ Martin Albrecht
- LWE with Side Information: Attacks and Concrete Security Estimation
- On the Hardness of the Finite Field Isomorphism Problem w/ Antoine Joux
- On Dual Lattice Attacks Against Small Secret LWE and Parameter Choices in HElib and SEAL