-
1
-
-
51249173801
-
On Lovász' Lattice Reduction and the Nearest Lattice Point Problem
-
[B86]
-
[B86] L. Babai: On Lovász' Lattice Reduction and the Nearest Lattice Point Problem, Combinatorica, vol. 6, pp. 1-13, 1986.
-
(1986)
Combinatorica
, vol.6
, pp. 1-13
-
-
Babai, L.1
-
2
-
-
84947809062
-
Cryptanalysis of the Original McEliece Cryptosystem
-
LNCS #1541, [CSe98]
-
[CSe98] A. Canteaut and N. Sendrier: Cryptanalysis of the Original McEliece Cryptosystem, Asiacrypt '98, LNCS #1541, pp. 187-199, 1998.
-
(1998)
Asiacrypt '98
, pp. 187-199
-
-
Canteaut, A.1
Sendrier, N.2
-
4
-
-
0003202609
-
A Course in Computational Algebraic Number Theory
-
Springer Verlag. [Co93]
-
[Co93] H. Cohen: A Course in Computational Algebraic Number Theory, Graduate Texts in Mathematics, vol. 138, Springer Verlag, 1993.
-
(1993)
Graduate Texts in Mathematics
, vol.138
-
-
Cohen, H.1
-
6
-
-
0023294681
-
Hermite Normal Form Computation using modulo Determinant Arithmetic
-
[DKT87]
-
[DKT87] P.D. Domich, R. Kannan and L.E. Trotter: Hermite Normal Form Computation using modulo Determinant Arithmetic, Mathematics of Operation Research, vol. 12(1), pp. 50-59, 1987.
-
(1987)
Mathematics of Operation Research
, vol.12
, Issue.1
, pp. 50-59
-
-
Domich, P.D.1
Kannan, R.2
Trotter, L.E.3
-
7
-
-
0024682725
-
Succinct Certificates for Almost all Subset Sum Problems
-
[FK89]
-
[FK89] M.L. Furst and R. Kannan: Succinct Certificates for Almost all Subset Sum Problems, SIAM Journal on Computing, vol. 18(3), pp. 550-558, 1989.
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.3
, pp. 550-558
-
-
Furst, M.L.1
Kannan, R.2
-
8
-
-
84958655849
-
Public-Key Cryptosystems from Lattice Reduction Problems
-
LNCS #1294, [GGH97]
-
[GGH97] O. Goldreich, S. Goldwasser, S. Halevi: Public-Key Cryptosystems from Lattice Reduction Problems, Crypto '97, LNCS #1294, pp. 112-131.
-
Crypto '97
, pp. 112-131
-
-
Goldreich, O.1
Goldwasser, S.2
Halevi, S.3
-
9
-
-
0000126406
-
Minkowski's Convex Body Theorem and Integer Programming
-
[K87]
-
[K87] R. Kannan: Minkowski's Convex Body Theorem and Integer Programming, Mathematics of Operation Research, vol. 12(3), pp. 415-440, 1987.
-
(1987)
Mathematics of Operation Research
, vol.12
, Issue.3
, pp. 415-440
-
-
Kannan, R.1
-
10
-
-
0003335330
-
Arithmetic of Quadratic Forms
-
Cambridge University Press, . [K93]
-
[K93] Y. Kitaoka: Arithmetic of Quadratic Forms, Cambridge Tracts in Mathematics, vol. 106, Cambridge University Press, 1993.
-
(1993)
Cambridge Tracts in Mathematics
, vol.106
-
-
Kitaoka, Y.1
-
11
-
-
34250244723
-
Factoring Polynomials with Rational Coefficients
-
[LLL82]
-
[LLL82] A.K. Lenstra, H.W. Lenstra and L. Lovasz: Factoring Polynomials with Rational Coefficients, Mathematische Annalen, vol. 261, pp. 515-534, 1982.
-
(1982)
Mathematische Annalen
, vol.261
, pp. 515-534
-
-
Lenstra, A.K.1
Lenstra, H.W.2
Lovasz, L.3
-
12
-
-
34249953865
-
Korkin-Zolotarev Bases and successive Minima of a Lattice and its Reciprocal Lattice
-
[LLS90]
-
[LLS90] J.C. Lagarias, H.W. Lenstra and C.P. Schnorr: Korkin-Zolotarev Bases and successive Minima of a Lattice and its Reciprocal Lattice, Combinatorica, vol. 10, pp. 333-348, 1990.
-
(1990)
Combinatorica
, vol.10
, pp. 333-348
-
-
Lagarias, J.C.1
Lenstra, H.W.2
Schnorr, C.P.3
-
14
-
-
0011409771
-
The Theory of Error Correcting Codes
-
North-Holland. [MS77]
-
[MS77] F.J. MacWilliams and N.J. Sloane: The Theory of Error Correcting Codes, Mathematical Library Vol. 16, North-Holland, 1977.
-
(1977)
Mathematical Library
, vol.16
-
-
McWilliams, F.J.1
Sloane, N.J.2
-
16
-
-
0005018185
-
Lattice Points in high-dimensional Spheres
-
[M090]
-
[M090] J.E. Mazo and A.M. Odlyzko: Lattice Points in high-dimensional Spheres, Monatshefte Mathematik, vol. 110(1), pp. 47-61, 1990.
-
(1990)
Monatshefte Mathematik
, vol.110
, Issue.1
, pp. 47-61
-
-
Mazo, J.E.1
Odlyzko, A.M.2
-
17
-
-
35248865484
-
Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97
-
LNCS #???. [N99]
-
[N99] P. Nguyen: Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97, Crypto '99, LNCS #???.
-
Crypto '99
-
-
Nguyen, P.1
-
20
-
-
0014853031
-
On Decoding Iterated Codes
-
[R70]
-
[R70] S.M. Reddy: On Decoding Iterated Codes, IEEE Transaction on Information Theory, Vol. 16(5), pp. 624-627, 1970.
-
(1970)
IEEE Transaction on Information Theory
, vol.16
, Issue.5
, pp. 624-627
-
-
Reddy, S.M.1
-
21
-
-
0023532388
-
A Hierarchy of Polynomial Time Lattice Basis Reduction Algorithms
-
[S87]
-
[S87] C.P. Schnorr: A Hierarchy of Polynomial Time Lattice Basis Reduction Algorithms, Theoretical Computer Science, vol. 53, pp. 201-224, 1987.
-
(1987)
Theoretical Computer Science
, vol.53
, pp. 201-224
-
-
Schnorr, C.P.1
-
22
-
-
84974183411
-
Block Reduced Lattice Bases and Successive Minima
-
[S94]
-
[S94] C.P. Schnorr: Block Reduced Lattice Bases and Successive Minima, Combinatorics, Probability and Computing, vol. 3, pp. 507-522, 1994.
-
(1994)
Combinatorics, Probability and Computing
, vol.3
, pp. 507-522
-
-
Schnorr, C.P.1
-
23
-
-
0009452048
-
Attacking the Chor-Rivest Cryptosystem by improved Lattice Reduction
-
LNCS #921, [SH95]
-
[SH95] C.P. Schnorr and H.H. Horner: Attacking the Chor-Rivest Cryptosystem by improved Lattice Reduction, Eurocrypt '95, LNCS #921, pp. 1-12, 1995.
-
(1995)
Eurocrypt '95
, pp. 1-12
-
-
Schnorr, C.P.1
Horner, H.H.2
-
24
-
-
84961360024
-
Lattice Attacks on the GGH Cryptosystem
-
[SF+97]
-
[SF+97] C.P. Schnorr, M. Fischlin, R. Fischlin, H. Koy and A. May: Lattice Attacks on the GGH Cryptosystem, Crypto '97 Rump Session, 1997.
-
(1997)
Crypto '97 Rump Session
-
-
Schnorr, C.P.1
Fischlin, M.2
Fischlin, R.3
Koy, H.4
May, A.5
|