-
3
-
-
0000303291
-
New bounds in some transference theorems in the geometry of numbers
-
BANASZCZYK, W. 1993. New bounds in some transference theorems in the geometry of numbers. Math. Annal. 296, 4, 625-635.
-
(1993)
Math. Annal.
, vol.296
, Issue.4
, pp. 625-635
-
-
Banaszczyk, W.1
-
4
-
-
0032614215
-
Applications of a new transference theorem to Ajtai's connection factor
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
CAI, J.-Y. 1999. Applications of a new transference theorem to Ajtai's connection factor. In Proceedings of the 14th IEEE Conference on Computational Complexity. IEEE Computer Society Press, Los Alamitos, Calif., pp. 205-214.
-
(1999)
Proceedings of the 14th IEEE Conference on Computational Complexity
, pp. 205-214
-
-
Cai, J.-Y.1
-
5
-
-
0031377422
-
An improved worst-case to average-case connection for lattice problems (extended abstract)
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
CAI, J.-Y., AND NERURKAR, A. P. 1997. An improved worst-case to average-case connection for lattice problems (extended abstract). In Proceedings of the 38th IEEE Symposium on Foundations of Computer Science. IEEE Computer Society Press, Los Alamitos, Calif., pp. 468-477.
-
(1997)
Proceedings of the 38th IEEE Symposium on Foundations of Computer Science
, pp. 468-477
-
-
Cai, J.-Y.1
Nerurkar, A.P.2
-
6
-
-
0004171614
-
-
Advanced Lectures in Mathematics. Friedr. Vieweg & Sohn, Braunschweig. Revised edition. (A course partially based on lectures by F. Hirzebruch.)
-
EBELING, W. 2002. Lattices and codes, Advanced Lectures in Mathematics. Friedr. Vieweg & Sohn, Braunschweig. Revised edition. (A course partially based on lectures by F. Hirzebruch.)
-
(2002)
Lattices and Codes
-
-
Ebeling, W.1
-
7
-
-
0034288481
-
On quantum algorithms for noncommutative hidden subgroups
-
ETTINGER, M., AND HÈYER, P. 2000. On quantum algorithms for noncommutative hidden subgroups. Adv. in Appl. Math. 25, 3, 239-251.
-
(2000)
Adv. in Appl. Math.
, vol.25
, Issue.3
, pp. 239-251
-
-
Ettinger, M.1
Hèyer, P.2
-
8
-
-
0037770162
-
Hidden translation and orbit coset in quantum computing
-
ACM, New York
-
FRIEDL, K., IVANYOS, G., MAGNIEZ, F., SANTHA, M., AND SEN, P. 2003. Hidden translation and orbit coset in quantum computing. In Proceedings of the 35th ACM Symposium on Theory of Computing. ACM, New York, 1-9.
-
(2003)
Proceedings of the 35th ACM Symposium on Theory of Computing
, pp. 1-9
-
-
Friedl, K.1
Ivanyos, G.2
Magniez, F.3
Santha, M.4
Sen, P.5
-
10
-
-
84958598719
-
Eliminating decryption errors in the Ajtai-Dwork cryptosystem
-
Lecture Notes in Computer Science. Springer-Verlag, New York
-
GOLDREICH, O., GOLDWASSER, S., AND HALEVI, S. 1997a. Eliminating decryption errors in the Ajtai-Dwork cryptosystem. In Advances in Cryptology. Lecture Notes in Computer Science, vol. 1294. Springer-Verlag, New York, pp. 105-111.
-
(1997)
Advances in Cryptology
, vol.1294
, pp. 105-111
-
-
Goldreich, O.1
Goldwasser, S.2
Halevi, S.3
-
11
-
-
84958655849
-
Public-key cryptosystems from lattice reduction problems
-
Lecture Notes in Computer Science. Springer-Verlag, New York
-
GOLDREICH, O., GOLDWASSER, S., AND HALEVI, S. 1997b. Public-key cryptosystems from lattice reduction problems. In Advances in Cryptology. Lecture Notes in Computer Science, vol. 1294. Springer-Verlag, New York, pp. 112-131.
-
(1997)
Advances in Cryptology
, vol.1294
, pp. 112-131
-
-
Goldreich, O.1
Goldwasser, S.2
Halevi, S.3
-
12
-
-
0032613321
-
Approximating shortest lattice vectors is not harder than approximating closest lattice vectors
-
GOLDREICH, O., MICCIANCIO, D., SAFRA, S., AND SEIFERT, J.-P. 1999. Approximating shortest lattice vectors is not harder than approximating closest lattice vectors. Inf. Proc. Lett. 71, 2, 55-61.
-
(1999)
Inf. Proc. Lett.
, vol.71
, Issue.2
, pp. 55-61
-
-
Goldreich, O.1
Micciancio, D.2
Safra, S.3
Seifert, J.-P.4
-
13
-
-
0034819348
-
Quantum mechanical algorithms for the non-Abelian hidden subgroup problem
-
ACM, New York
-
GRIGNI, M., SCHULMAN, L. J., VAZIRANI, M., AND VAZIRANI, U. V. 2001. Quantum mechanical algorithms for the non-Abelian hidden subgroup problem. In Proceedings of the 33rd ACM Symposium on Theory of Computing. ACM, New York, 68-74.
-
(2001)
Proceedings of the 33rd ACM Symposium on Theory of Computing
, pp. 68-74
-
-
Grigni, M.1
Schulman, L.J.2
Vazirani, M.3
Vazirani, U.V.4
-
14
-
-
0033692053
-
Normal subgroup reconstruction and quantum computation using group representations
-
ACM, New York
-
HALLGREN, S., RUSSELL, A., AND TA-SHMA, A. 2000. Normal subgroup reconstruction and quantum computation using group representations. In Proceedings of the 32nd ACM Symposium on Theory of Computing. ACM, New York, 627-635.
-
(2000)
Proceedings of the 32nd ACM Symposium on Theory of Computing
, pp. 627-635
-
-
Hallgren, S.1
Russell, A.2
Ta-Shma, A.3
-
15
-
-
84947808606
-
NTRU: A ring-based public key cryptosystem
-
Lecture Notes in Computer Science. Springer-Verlag, New York
-
HOFFSTEIN, J., PIPHER, J., AND SILVERMAN, J. H. 1998. NTRU: A ring-based public key cryptosystem. In Algorithmic Number Theory. Lecture Notes in Computer Science, vol. 1423. Springer-Verlag, New York, pp. 267-288.
-
(1998)
Algorithmic Number Theory
, vol.1423
, pp. 267-288
-
-
Hoffstein, J.1
Pipher, J.2
Silverman, J.H.3
-
16
-
-
0001143795
-
Efficient cryptographic schemes provably as secure as subset sum
-
IMPAGLIAZZO, R., AND NAOR, M. 1996. Efficient cryptographic schemes provably as secure as subset sum. J. Crypt. 9, 4, 199-216.
-
(1996)
J. Crypt.
, vol.9
, Issue.4
, pp. 199-216
-
-
Impagliazzo, R.1
Naor, M.2
-
17
-
-
0012524253
-
-
Birkhäuser Boston Inc., Boston, Mass.
-
JOHANNES, K., UWE, S., AND JACOBO, T. 1993. The graph isomorphism problem: Its structural complexity. Birkhäuser Boston Inc., Boston, Mass.
-
(1993)
The Graph Isomorphism Problem: Its Structural Complexity
-
-
Johannes, K.1
Uwe, S.2
Jacobo, T.3
-
19
-
-
34250244723
-
Factoring polynomials with rational coefficients
-
LENSTRA, A. K., LENSTRA, JR., H. W., AND LOVASZ, L. 1982. Factoring polynomials with rational coefficients. Math. Ann. 261, 4, 515-534.
-
(1982)
Math. Ann.
, vol.261
, Issue.4
, pp. 515-534
-
-
Lenstra, A.K.1
Lenstra Jr., H.W.2
Lovasz, L.3
-
20
-
-
84958950822
-
Improving lattice based cryptosystems using the hermite normal form
-
(Providence, R. I., Mar.). Lecture Notes in Computer Science, Springer-Verlag, New York
-
MICCIANCIO, D. 2001. Improving lattice based cryptosystems using the hermite normal form. In Cryptography and Lattices Conference (CaLC) (Providence, R. I., Mar.). Lecture Notes in Computer Science, vol. 2146, Springer-Verlag, New York, pp. 126-145.
-
(2001)
Cryptography and Lattices Conference (CaLC)
, vol.2146
, pp. 126-145
-
-
Micciancio, D.1
-
21
-
-
0036949107
-
Generalized compact knapsacks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions
-
(Vancouver, B. C. Canada, Nov.). IEEE Computer Society Press, Los Alamitos, Calif.
-
MICCIANCIO, D. 2002a. Generalized compact knapsacks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions. In Proceedings of the 43rd IEEE Symposium on Foundations of Computer Science (Vancouver, B. C. Canada, Nov.). IEEE Computer Society Press, Los Alamitos, Calif.
-
(2002)
Proceedings of the 43rd IEEE Symposium on Foundations of Computer Science
-
-
Micciancio, D.1
-
22
-
-
0036036845
-
Improved cryptographic hash functions with worst-case/average-case connection
-
(Montreal, Ont., Canada). ACM, New York
-
MICCIANCIO, D. 2002b. Improved cryptographic hash functions with worst-case/average-case connection. In Proceedings of the 34th ACM Symposium on Theory of Computing (Montreal, Ont., Canada). ACM, New York, 609-618.
-
(2002)
Proceedings of the 34th ACM Symposium on Theory of Computing
, pp. 609-618
-
-
Micciancio, D.1
-
23
-
-
0012524599
-
-
The Kluwer International Series in Engineering and Computer Science. Kluwer, Boston, Mass.
-
MICCIANCIO, D., AND GOLDWASSER, S. 2002. Complexity of Lattice Problems: A Cryptographic Perspective. The Kluwer International Series in Engineering and Computer Science, vol. 671. Kluwer, Boston, Mass.
-
(2002)
Complexity of Lattice Problems: A Cryptographic Perspective
, vol.671
-
-
Micciancio, D.1
Goldwasser, S.2
-
24
-
-
17744363914
-
Worst-case to average-case reductions based on Gaussian measures
-
IEEE Computer Society Press, Los Alamitos, Calif
-
MICCIANCIO, D., AND REGEV, O. 2004. Worst-case to average-case reductions based on Gaussian measures. In Proceedings of the 45th Annual IEEE Symposium on Foundations of Computer Science. IEEE Computer Society Press, Los Alamitos, Calif, pp. 372-381.
-
(2004)
Proceedings of the 45th Annual IEEE Symposium on Foundations of Computer Science
, pp. 372-381
-
-
Micciancio, D.1
Regev, O.2
-
25
-
-
0036954431
-
Quantum computation and lattice problems
-
(Vancouver, B.C., Canada. Nov.). IEEE Computer Society Press, Los Alamitos, Calif.
-
REGEV, O. 2002. Quantum computation and lattice problems. In Proceedings of the 43rd IEEE Symposium on Foundations of Computer Science (Vancouver, B.C., Canada. Nov.). IEEE Computer Society Press, Los Alamitos, Calif.
-
(2002)
Proceedings of the 43rd IEEE Symposium on Foundations of Computer Science
-
-
Regev, O.1
-
27
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
SHOR, P. W. 1997. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26, 5, 1484-1509.
-
(1997)
SIAM J. Comput.
, vol.26
, Issue.5
, pp. 1484-1509
-
-
Shor, P.W.1
-
28
-
-
17744370172
-
-
Master's Thesis TR-2002-03. Dept. Comput. Sci., University of Chicago, Chicago, Ill
-
STEFANKOVIC, D. 2003 Fourier transforms in computer science. Master's Thesis TR-2002-03. Dept. Comput. Sci., University of Chicago, Chicago, Ill.
-
(2003)
Fourier Transforms in Computer Science
-
-
Stefankovic, D.1
|