-
1
-
-
0038784608
-
The worst-case behavior of Schnorr's algorithm approximating the shortest nonzero vector in a lattice
-
(electronic), New York. ACM
-
M. Ajtai. The worst-case behavior of Schnorr's algorithm approximating the shortest nonzero vector in a lattice. In Proceedings of the Thirty-Fifth Annual ACM Symposium on Theory of Computing, pages 396-406 (electronic), New York, 2003. ACM.
-
(2003)
Proceedings of the Thirty-fifth Annual ACM Symposium on Theory of Computing
, pp. 396-406
-
-
Ajtai, M.1
-
2
-
-
0034826416
-
A sieve algorithm for the shortest lattice vector problem
-
ACM
-
M. Ajtai, R. Kumar, and D. Sivakumar. A sieve algorithm for the shortest lattice vector problem. In Proc. 33rd STOC, pages 601-610. ACM, 2001.
-
(2001)
Proc. 33rd STOC
, pp. 601-610
-
-
Ajtai, M.1
Kumar, R.2
Sivakumar, D.3
-
3
-
-
0035879622
-
Radon transforms and packings
-
M. I. Boguslavsky. Radon transforms and packings. Discrete Appl. Math., 111(1-2):3-22, 2001.
-
(2001)
Discrete Appl. Math.
, vol.111
, Issue.1-2
, pp. 3-22
-
-
Boguslavsky, M.I.1
-
4
-
-
0000552770
-
Twenty years of attacks on the RSA cryptosystem
-
D. Boneh. Twenty years of attacks on the RSA cryptosystem. Notices of the AMS, 46(2):203-213, 1999.
-
(1999)
Notices of the AMS
, vol.46
, Issue.2
, pp. 203-213
-
-
Boneh, D.1
-
5
-
-
84957672468
-
0.292
-
Proc. of Eurocrypt '99. IACR, Springer-Verlag
-
0.292. In Proc. of Eurocrypt '99, volume 1592 of LNCS, pages 1-11. IACR, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 1-11
-
-
Boneh, D.1
Durfee, G.2
-
6
-
-
0003806299
-
-
Rational quadratic forms. Academic Press Inc. [Harcourt Brace Jovanovich Publishers], London
-
J. W. S. Cassels. Rational quadratic forms, volume 13 of London Mathematical Society Monographs. Academic Press Inc. [Harcourt Brace Jovanovich Publishers], London, 1978.
-
(1978)
London Mathematical Society Monographs
, vol.13
-
-
Cassels, J.W.S.1
-
9
-
-
0001494997
-
Small solutions to polynomial equations, and low exponent RSA vulnerabilities
-
Revised version of two articles from Eurocrypt '96
-
D. Coppersmith. Small solutions to polynomial equations, and low exponent RSA vulnerabilities. J. of Cryptology, 10(4):233-260, 1997. Revised version of two articles from Eurocrypt '96.
-
(1997)
J. of Cryptology
, vol.10
, Issue.4
, pp. 233-260
-
-
Coppersmith, D.1
-
10
-
-
0003957164
-
-
Geometric algorithms and combinatorial optimization. Springer-Verlag, Berlin
-
M. Grötschel, L. Lovász, and A. Schrijver. Geometric algorithms and combinatorial optimization, volume 2 of Algorithms and Combinatorics: Study and Research Texts. Springer-Verlag, Berlin, 1988.
-
(1988)
Algorithms and Combinatorics: Study and Research Texts
, vol.2
-
-
Grötschel, M.1
Lovász, L.2
Schrijver, A.3
-
11
-
-
24944510964
-
Extraits de lettres de M. Hermite à M. Jacobi sur différents objets de la théorie des nombres, deuxième lettre
-
published by Gauthier-Villars
-
C. Hermite. Extraits de lettres de M. Hermite à M. Jacobi sur différents objets de la théorie des nombres, deuxième lettre. J. Reine Angew. Math., 40:279-290, 1850. Also available in the first volume of Hermite's complete works, published by Gauthier-Villars.
-
(1850)
J. Reine Angew. Math.
, vol.40
, pp. 279-290
-
-
Hermite, C.1
-
12
-
-
0035427012
-
Lattice attacks on digital signature schemes
-
N. A. Howgrave-Graham and N. P. Smart. Lattice attacks on digital signature schemes. Des. Codes Cryptogr., 23(3):283-290, 2001.
-
(2001)
Des. Codes Cryptogr.
, vol.23
, Issue.3
, pp. 283-290
-
-
Howgrave-Graham, N.A.1
Smart, N.P.2
-
14
-
-
34250244723
-
Factoring polynomials with rational coefficients
-
A. K. Lenstra, H. W. Lenstra, Jr., and L. Lovász. Factoring polynomials with rational coefficients. Mathematische Ann., 261:513-534, 1982.
-
(1982)
Mathematische Ann.
, vol.261
, pp. 513-534
-
-
Lenstra, A.K.1
Lenstra Jr., H.W.2
Lovász, L.3
-
15
-
-
84941159883
-
-
volume 50. SIAM Publications, 1986. CBMS-NSF Regional Conference Series in Applied Mathematics
-
L. Lovász. An Algorithmic Theory of Numbers, Graphs and Convexity, volume 50. SIAM Publications, 1986. CBMS-NSF Regional Conference Series in Applied Mathematics.
-
An Algorithmic Theory of Numbers, Graphs and Convexity
-
-
Lovász, L.1
-
17
-
-
0012524599
-
-
The Kluwer International Series in Engineering and Computer Science, Kluwer Academic Publishers, Boston, MA. A cryptographic perspective
-
D. Micciancio and S. Goldwasser. Complexity of lattice problems. The Kluwer International Series in Engineering and Computer Science, 671. Kluwer Academic Publishers, Boston, MA, 2002. A cryptographic perspective.
-
(2002)
Complexity of Lattice Problems
, pp. 671
-
-
Micciancio, D.1
Goldwasser, S.2
-
19
-
-
33746391879
-
The insecurity of the digital signature algorithm with partially known nonces
-
P. Q. Nguyen and I. E. Shparlinski. The insecurity of the digital signature algorithm with partially known nonces. J. Cryptology, 15(3):151-176, 2002.
-
(2002)
J. Cryptology
, vol.15
, Issue.3
, pp. 151-176
-
-
Nguyen, P.Q.1
Shparlinski, I.E.2
-
20
-
-
24944584767
-
Floating-point LLL revisited
-
Proc. of Eurocrypt '05. IACR, Springer-Verlag
-
P. Q. Nguyen and D. Stehle. Floating-point LLL revisited. In Proc. of Eurocrypt '05, volume 3494 of LNCS, pages 215-233. IACR, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 215-233
-
-
Nguyen, P.Q.1
Stehle, D.2
-
21
-
-
33846867921
-
The two faces of lattices in cryptology
-
Proc. of CALC '01. Springer-Verlag
-
P. Q. Nguyen and J. Stern. The two faces of lattices in cryptology. In Proc. of CALC '01, volume 2146 of LNCS. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2146
-
-
Nguyen, P.Q.1
Stern, J.2
-
22
-
-
0002114928
-
The rise and fall of knapsack cryptosystems
-
Proc. of Cryptology and Computational Number Theory. AMA
-
A. M. Odlyzko. The rise and fall of knapsack cryptosystems. In Proc. of Cryptology and Computational Number Theory, volume 42 of Proc. of Symposia in Applied Mathematics, pages 75-88. AMA, 1989.
-
(1989)
Proc. of Symposia in Applied Mathematics
, vol.42
, pp. 75-88
-
-
Odlyzko, A.M.1
-
23
-
-
84963044617
-
On positive definite quadratic forms
-
R. A. Rankin. On positive definite quadratic forms. J. London Math. Soc., 28:309-314, 1953.
-
(1953)
J. London Math. Soc.
, vol.28
, pp. 309-314
-
-
Rankin, R.A.1
-
24
-
-
0023532388
-
A hierarchy of polynomial lattice basis reduction algorithms
-
C. P. Schnorr. A hierarchy of polynomial lattice basis reduction algorithms. Theoretical Computer Science, 53:201-224, 1987.
-
(1987)
Theoretical Computer Science
, vol.53
, pp. 201-224
-
-
Schnorr, C.P.1
-
25
-
-
38249029857
-
A more efficient algorithm for lattice basis reduction
-
C. P. Schnorr. A more efficient algorithm for lattice basis reduction. J. of algorithms, 9(1):47-62, 1988.
-
(1988)
J. of Algorithms
, vol.9
, Issue.1
, pp. 47-62
-
-
Schnorr, C.P.1
-
26
-
-
33846200465
-
Lattice basis reduction: Improved practical algorithms and solving subset sum problems
-
C. P. Schnorr and M. Euchner. Lattice basis reduction: improved practical algorithms and solving subset sum problems. Math. Programming, 66:181-199, 1994.
-
(1994)
Math. Programming
, vol.66
, pp. 181-199
-
-
Schnorr, C.P.1
Euchner, M.2
-
27
-
-
0009452048
-
Attacking the Chor-Rivest cryptosystem by improved lattice reduction
-
Proc. of Eurocrypt '95. IACR, Springer-Verlag
-
C. P. Schnorr and H. H. Hörner. Attacking the Chor-Rivest cryptosystem by improved lattice reduction. In Proc. of Eurocrypt '95, volume 921 of LNCS, pages 1-12. IACR, Springer-Verlag, 1995.
-
(1995)
LNCS
, vol.921
, pp. 1-12
-
-
Schnorr, C.P.1
Hörner, H.H.2
-
28
-
-
0032419114
-
Higher-dimensional analogs of Hermite's constant
-
J. L. Thunder. Higher-dimensional analogs of Hermite's constant. Michigan Math. J., 45(2):301-314, 1998.
-
(1998)
Michigan Math. J.
, vol.45
, Issue.2
, pp. 301-314
-
-
Thunder, J.L.1
|