@article{Both_May_2017, title={The Approximate k-List Problem}, volume={2017}, url={https://tosc.iacr.org/index.php/ToSC/article/view/600}, DOI={10.13154/tosc.v2017.i1.380-397}, abstractNote={<p>We study a generalization of the <em>k</em>-list problem, also known as the Generalized Birthday problem. In the <em>k</em>-list problem, one starts with <em>k</em> lists of binary vectors and has to find a set of vectors – one from each list – that sum to the all-zero target vector. In our generalized Approximate <em>k</em>-list problem, one has to find a set of vectors that sum to a vector of small Hamming weight <em>ω</em>. Thus, we relax the condition on the target vector and allow for some error positions. This in turn helps us to significantly reduce the size of the starting lists, which determines the memory consumption, and the running time as a function of <em>ω</em>. For <em>ω</em> = 0, our algorithm achieves the original <em>k</em>-list run-time/memory consumption, whereas for <em>ω</em> = <sup>n</sup>/<sub>2</sub> it has polynomial complexity. As in the <em>k</em>-list case, our Approximate <em>k</em>-list algorithm is defined for all <em>k</em> = 2<sup>m</sup>,m > 1. Surprisingly, we also find an Approximate 3-list algorithm that improves in the runtime exponent compared to its 2-list counterpart for all 0 < <em>ω</em> < <sup>n</sup>/<sub>2</sub>. To the best of our knowledge this is the first such improvement of some variant of the notoriously hard 3-list problem. As an application of our algorithm we compute small weight multiples of a given polynomial with more flexible degree than with Wagner’s algorithm from Crypto 2002 and with smaller time/memory consumption than with Minder and Sinclair’s algorithm from SODA 2009.</p>}, number={1}, journal={IACR Transactions on Symmetric Cryptology}, author={Both, Leif and May, Alexander}, year={2017}, month={Mar.}, pages={380-397} }